General
-
Target
bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118
-
Size
1.3MB
-
Sample
241203-hbychazkem
-
MD5
bc1eab92bebb47e47c704aac84b35e68
-
SHA1
3b6009f45154d7e6cd201557a17eb693278d3eaa
-
SHA256
2a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c
-
SHA512
08f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0
-
SSDEEP
6144:O9UaIuFpuvGr5ojjc6sdV0x9Bwb47nTplvV3D77eraR:zQUC6sdWXBIknTplt3DveraR
Behavioral task
behavioral1
Sample
bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118
-
Size
1.3MB
-
MD5
bc1eab92bebb47e47c704aac84b35e68
-
SHA1
3b6009f45154d7e6cd201557a17eb693278d3eaa
-
SHA256
2a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c
-
SHA512
08f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0
-
SSDEEP
6144:O9UaIuFpuvGr5ojjc6sdV0x9Bwb47nTplvV3D77eraR:zQUC6sdWXBIknTplt3DveraR
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-