General
-
Target
ec48c109e0a0d72e10ec5eb4409e0693_JaffaCakes118
-
Size
14KB
-
Sample
241213-tfqzrsvpdq
-
MD5
ec48c109e0a0d72e10ec5eb4409e0693
-
SHA1
cca2813f138bd0869a0d8863c87bc3450371124e
-
SHA256
12e9ae657fa5ded8d17713f745efec143ea99c16f6f13758f57a95e6a8e4553b
-
SHA512
c893e3f4ec2b48982c09cda84b744863cdced452e1257c68f804bb1f263f8ac78a128de31e9fa27db750a9c95dae17cea80918e9e0894c9dcd9119a2616a90e1
-
SSDEEP
48:6D640H+VzPiZerMpZytjWeyLhnhIAsYBlnfKNUJ7cXhHeq0JEI0oqtIzNi:WmHGzq6tjW33XlfK+JkhsJNcy
Behavioral task
behavioral1
Sample
ec48c109e0a0d72e10ec5eb4409e0693_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec48c109e0a0d72e10ec5eb4409e0693_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/exec
Targets
-
-
Target
ec48c109e0a0d72e10ec5eb4409e0693_JaffaCakes118
-
Size
14KB
-
MD5
ec48c109e0a0d72e10ec5eb4409e0693
-
SHA1
cca2813f138bd0869a0d8863c87bc3450371124e
-
SHA256
12e9ae657fa5ded8d17713f745efec143ea99c16f6f13758f57a95e6a8e4553b
-
SHA512
c893e3f4ec2b48982c09cda84b744863cdced452e1257c68f804bb1f263f8ac78a128de31e9fa27db750a9c95dae17cea80918e9e0894c9dcd9119a2616a90e1
-
SSDEEP
48:6D640H+VzPiZerMpZytjWeyLhnhIAsYBlnfKNUJ7cXhHeq0JEI0oqtIzNi:WmHGzq6tjW33XlfK+JkhsJNcy
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext
-