General
-
Target
d506d035b8f72b4355121ef7f5f1dacd_JaffaCakes118
-
Size
56KB
-
Sample
241208-dz99ravphj
-
MD5
d506d035b8f72b4355121ef7f5f1dacd
-
SHA1
43132081406ff6a3f43c2c72f9dfd0bf31cd4689
-
SHA256
072ae735e2fea0fbc9077c86f8c59fce52c0bbc336738acccdcc0f3664f646c8
-
SHA512
008585e3feac17f893115825f4e95adec9f391a98e2b04c88859d4c0774e953440d922620a4bd5b48eb39f2216c0ba7d5cf0aa7f58d81371feb632f93f134ef6
-
SSDEEP
768:oC38CEmT5dYQKb456jz0unkw1kRlBwaIOZkZGPxY7sNZnb65vRPbhBH:oChEPFezRroaYI/+vRPbhB
Static task
static1
Behavioral task
behavioral1
Sample
d506d035b8f72b4355121ef7f5f1dacd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d506d035b8f72b4355121ef7f5f1dacd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d506d035b8f72b4355121ef7f5f1dacd_JaffaCakes118
-
Size
56KB
-
MD5
d506d035b8f72b4355121ef7f5f1dacd
-
SHA1
43132081406ff6a3f43c2c72f9dfd0bf31cd4689
-
SHA256
072ae735e2fea0fbc9077c86f8c59fce52c0bbc336738acccdcc0f3664f646c8
-
SHA512
008585e3feac17f893115825f4e95adec9f391a98e2b04c88859d4c0774e953440d922620a4bd5b48eb39f2216c0ba7d5cf0aa7f58d81371feb632f93f134ef6
-
SSDEEP
768:oC38CEmT5dYQKb456jz0unkw1kRlBwaIOZkZGPxY7sNZnb65vRPbhBH:oChEPFezRroaYI/+vRPbhB
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext
-