General
-
Target
a0cf5e65d6531b369af210b3ab0b0213_JaffaCakes118
-
Size
89KB
-
Sample
241126-j5798syqdr
-
MD5
a0cf5e65d6531b369af210b3ab0b0213
-
SHA1
1760af8ff383bb02eb0f8e57c635a2fd4dbc67d1
-
SHA256
ef69f72e41266b42e866911d6e9e260602048423a390fa146c993c347fbc009c
-
SHA512
c2eb8b8ea0a4761e23ec1860e50264e0c6d3eeac8ac94085c3b41c806a7c503880ae577285c9b686c381a69215ec2c91763a95ff4569d6a943afbd74c464a5c6
-
SSDEEP
1536:6rEqYtQ1Z9avYYxJgTI5ZE2NmP+GePggBW0xq5blejv0XlVUjKnoXlG4Ms71BEDd:jtKAY/2EumdeoaW0xq5bUS+KosJsRIPx
Static task
static1
Behavioral task
behavioral1
Sample
a0cf5e65d6531b369af210b3ab0b0213_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0cf5e65d6531b369af210b3ab0b0213_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
a0cf5e65d6531b369af210b3ab0b0213_JaffaCakes118
-
Size
89KB
-
MD5
a0cf5e65d6531b369af210b3ab0b0213
-
SHA1
1760af8ff383bb02eb0f8e57c635a2fd4dbc67d1
-
SHA256
ef69f72e41266b42e866911d6e9e260602048423a390fa146c993c347fbc009c
-
SHA512
c2eb8b8ea0a4761e23ec1860e50264e0c6d3eeac8ac94085c3b41c806a7c503880ae577285c9b686c381a69215ec2c91763a95ff4569d6a943afbd74c464a5c6
-
SSDEEP
1536:6rEqYtQ1Z9avYYxJgTI5ZE2NmP+GePggBW0xq5blejv0XlVUjKnoXlG4Ms71BEDd:jtKAY/2EumdeoaW0xq5bUS+KosJsRIPx
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-