General
-
Target
e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118
-
Size
66KB
-
Sample
241212-fd47qa1mey
-
MD5
e4c093a7831ada9478504e4fa58e32ae
-
SHA1
cb8163b70c9c77fe08e983318ff9a71e57bf6d7d
-
SHA256
f496f9778c5e5594313e74afa1f97e4a645201c8bcca12ae671e4e5e6c188244
-
SHA512
aaa432bc07d38e18ac97ac984b55ed82643d1a1f70a572020f9511fcac3132f5cb9e1477dd7ba0a6b1362f0086b51fe2aaf15f6c7af18ea598d7b7acb782f4b1
-
SSDEEP
1536:/Cev+DwFo8g8F5RQ5llxtyCIrc+px4REuUg4rVvio:rvAso855R2LCZmEuUX1io
Behavioral task
behavioral1
Sample
e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118
-
Size
66KB
-
MD5
e4c093a7831ada9478504e4fa58e32ae
-
SHA1
cb8163b70c9c77fe08e983318ff9a71e57bf6d7d
-
SHA256
f496f9778c5e5594313e74afa1f97e4a645201c8bcca12ae671e4e5e6c188244
-
SHA512
aaa432bc07d38e18ac97ac984b55ed82643d1a1f70a572020f9511fcac3132f5cb9e1477dd7ba0a6b1362f0086b51fe2aaf15f6c7af18ea598d7b7acb782f4b1
-
SSDEEP
1536:/Cev+DwFo8g8F5RQ5llxtyCIrc+px4REuUg4rVvio:rvAso855R2LCZmEuUX1io
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-