General
-
Target
b43420cadb4ad3a3042796776d153bff_JaffaCakes118
-
Size
46KB
-
Sample
241130-aln8ksylbr
-
MD5
b43420cadb4ad3a3042796776d153bff
-
SHA1
194f0b9452398588197e2dc4817463025de36648
-
SHA256
b2a612daa8eb07a2894606b73efa3c48a56889c0dfe1f47a146b6e7405dba230
-
SHA512
124ebbb56f2ccfdf72cbd2486513c6541d6fec13f89158fe244ae3f1bbe33fdddb68c293ee96b6def8e0aeadfdcdfbb951064c345bc8ce54b72757804eb5f6d0
-
SSDEEP
768:RMnCHBjSfD0RDSjsYYXi5M4z54q+F5871mJMOUlNu0ZBA9U:fHFSfARDSo9AbmJZUlNu0bP
Static task
static1
Behavioral task
behavioral1
Sample
b43420cadb4ad3a3042796776d153bff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b43420cadb4ad3a3042796776d153bff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
b43420cadb4ad3a3042796776d153bff_JaffaCakes118
-
Size
46KB
-
MD5
b43420cadb4ad3a3042796776d153bff
-
SHA1
194f0b9452398588197e2dc4817463025de36648
-
SHA256
b2a612daa8eb07a2894606b73efa3c48a56889c0dfe1f47a146b6e7405dba230
-
SHA512
124ebbb56f2ccfdf72cbd2486513c6541d6fec13f89158fe244ae3f1bbe33fdddb68c293ee96b6def8e0aeadfdcdfbb951064c345bc8ce54b72757804eb5f6d0
-
SSDEEP
768:RMnCHBjSfD0RDSjsYYXi5M4z54q+F5871mJMOUlNu0ZBA9U:fHFSfARDSo9AbmJZUlNu0bP
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
4125926391466fdbe8a4730f2374b033
-
SHA1
fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
-
SHA256
6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
-
SHA512
32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
SSDEEP
192:4O6dJA/ruAFEiUdWWE6hE5RYUdJfbub1algMO:RKAFERdlxhGRYUzqZal
Score3/10 -