General
-
Target
a69e09696efbd7519b3f92fc6777036f_JaffaCakes118
-
Size
197KB
-
Sample
241127-h74jdszpfr
-
MD5
a69e09696efbd7519b3f92fc6777036f
-
SHA1
25e5f99846d1490e507435365915ec4261df28fa
-
SHA256
f5b2f7d220074b265fb1611eaa9d76aab6669352739310ab974463c5402afc9d
-
SHA512
36e5a13684b6db0adc23429a03f8dd831beaa3ffc36c410a14088430700a9a88c8a32faee1775f89d346dda2312f0323d7cc67a2858aeef165584c5b2cd1bd2b
-
SSDEEP
3072:dRdLFKX9imD3EblxQtsI+3geBCVARHeVD7Ly4jG6Tb5yJw7qBdNHmQKY7:dPo7Dm78MQeQVwWfe4jG6ToJw78dNUo
Behavioral task
behavioral1
Sample
a69e09696efbd7519b3f92fc6777036f_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
a69e09696efbd7519b3f92fc6777036f_JaffaCakes118
-
Size
197KB
-
MD5
a69e09696efbd7519b3f92fc6777036f
-
SHA1
25e5f99846d1490e507435365915ec4261df28fa
-
SHA256
f5b2f7d220074b265fb1611eaa9d76aab6669352739310ab974463c5402afc9d
-
SHA512
36e5a13684b6db0adc23429a03f8dd831beaa3ffc36c410a14088430700a9a88c8a32faee1775f89d346dda2312f0323d7cc67a2858aeef165584c5b2cd1bd2b
-
SSDEEP
3072:dRdLFKX9imD3EblxQtsI+3geBCVARHeVD7Ly4jG6Tb5yJw7qBdNHmQKY7:dPo7Dm78MQeQVwWfe4jG6ToJw78dNUo
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-