General
-
Target
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118
-
Size
394KB
-
Sample
241208-kn5y8aynct
-
MD5
d631173ab9e9fa327bbbea013b590c8c
-
SHA1
3dc47dd70d84de9fedd94712ff1e39af7a5f75bf
-
SHA256
54b6e8dff23773873d9e694cc20e0779bbad01859da3366ed94a68881923f738
-
SHA512
9b711bb0e4340ef045ebdf9105f49aed11bce9e6a68ded5bb4671f7331b142068d1280f3703c53e81638833cbbb8406f2c582be6e85cedbf12a7a2e0b4d734ee
-
SSDEEP
12288:1l+B4C/IqaqJncvvn4F0lcBj1vaMEpcJ:1l7WDJBcXn4DDvax
Static task
static1
Behavioral task
behavioral1
Sample
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d631173ab9e9fa327bbbea013b590c8c_JaffaCakes118
-
Size
394KB
-
MD5
d631173ab9e9fa327bbbea013b590c8c
-
SHA1
3dc47dd70d84de9fedd94712ff1e39af7a5f75bf
-
SHA256
54b6e8dff23773873d9e694cc20e0779bbad01859da3366ed94a68881923f738
-
SHA512
9b711bb0e4340ef045ebdf9105f49aed11bce9e6a68ded5bb4671f7331b142068d1280f3703c53e81638833cbbb8406f2c582be6e85cedbf12a7a2e0b4d734ee
-
SSDEEP
12288:1l+B4C/IqaqJncvvn4F0lcBj1vaMEpcJ:1l7WDJBcXn4DDvax
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-