General
-
Target
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118
-
Size
291KB
-
Sample
241202-ftgrcs1mas
-
MD5
b6f4f06b306d2ec8bb84f4312b3ead20
-
SHA1
9e3a7d1cdc6e4ca3e3f77b4e600c40cd751b2491
-
SHA256
01ab469cbc136b144f0f4f747af356de3270c794e9ab63e49b1b4ab908e9e079
-
SHA512
8b62dfa5b6ac38a3ff88fe4c08f8c1ab63a3df027c8ddbc2984ccacadb800fdedd52b087f6da4abc0c3d00618e457ba9c832dc9414866dfdf5f2a71b835433c1
-
SSDEEP
6144:00NJ7p6GME0ifks0TsCfYOiOr4TRRPgKJM5QabWHxD+kRdvqM:FJF6Gx0NqOrGoJQQWwkh
Static task
static1
Behavioral task
behavioral1
Sample
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118
-
Size
291KB
-
MD5
b6f4f06b306d2ec8bb84f4312b3ead20
-
SHA1
9e3a7d1cdc6e4ca3e3f77b4e600c40cd751b2491
-
SHA256
01ab469cbc136b144f0f4f747af356de3270c794e9ab63e49b1b4ab908e9e079
-
SHA512
8b62dfa5b6ac38a3ff88fe4c08f8c1ab63a3df027c8ddbc2984ccacadb800fdedd52b087f6da4abc0c3d00618e457ba9c832dc9414866dfdf5f2a71b835433c1
-
SSDEEP
6144:00NJ7p6GME0ifks0TsCfYOiOr4TRRPgKJM5QabWHxD+kRdvqM:FJF6Gx0NqOrGoJQQWwkh
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-