General
-
Target
b064ca30e2ed8adb7fd890b01e9476d1_JaffaCakes118
-
Size
115KB
-
Sample
241129-ln231atlgm
-
MD5
b064ca30e2ed8adb7fd890b01e9476d1
-
SHA1
260649950807d915986d44feea7c3778fba57692
-
SHA256
c6c0ffe04d03d817f1b5dd9f4b836e061dd31525c2c82c6a259a2f328719395b
-
SHA512
715d2ebb74c06a70f3da3764a77b7251fb96b6d2a4419e02c21d653c4caaefbff1c5d9fdafd9c425e300767fb770eea21d72caae4ac6a26687546247b3648a53
-
SSDEEP
3072:hf8wNOO5/bHoUYmxF44UkbZEvoA91mYxL:hn5dn4rkWgkhL
Static task
static1
Behavioral task
behavioral1
Sample
b064ca30e2ed8adb7fd890b01e9476d1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b064ca30e2ed8adb7fd890b01e9476d1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b064ca30e2ed8adb7fd890b01e9476d1_JaffaCakes118
-
Size
115KB
-
MD5
b064ca30e2ed8adb7fd890b01e9476d1
-
SHA1
260649950807d915986d44feea7c3778fba57692
-
SHA256
c6c0ffe04d03d817f1b5dd9f4b836e061dd31525c2c82c6a259a2f328719395b
-
SHA512
715d2ebb74c06a70f3da3764a77b7251fb96b6d2a4419e02c21d653c4caaefbff1c5d9fdafd9c425e300767fb770eea21d72caae4ac6a26687546247b3648a53
-
SSDEEP
3072:hf8wNOO5/bHoUYmxF44UkbZEvoA91mYxL:hn5dn4rkWgkhL
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-