General
-
Target
JaffaCakes118_6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c
-
Size
5KB
-
Sample
241223-rljrjasjbj
-
MD5
b23bb919abab80fb65d7e55c72b7e6f2
-
SHA1
bdd741fc33b7846d75146a13b3d9f650850d08cd
-
SHA256
6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c
-
SHA512
166e96d0ec37cb96e87ac5861267337085985e4445c14c54a7b72ad088a23f4f170d8b24b5363d9166df562dfa36482821eedbfc09b00509e265d1cd9b982b18
-
SSDEEP
24:ev1GSFGFajE/K3tQ3zSaJ2IkM6Pv617s3h/LjpKpuMA6QWTIANDPsa:qFGFajFK3zSIe7h/TMpQWTNTsa
Behavioral task
behavioral1
Sample
JaffaCakes118_6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
JaffaCakes118_6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c
-
Size
5KB
-
MD5
b23bb919abab80fb65d7e55c72b7e6f2
-
SHA1
bdd741fc33b7846d75146a13b3d9f650850d08cd
-
SHA256
6587c314464fd244a73e41da8d1dc832c47cae8e431fa55603e174fbbf41927c
-
SHA512
166e96d0ec37cb96e87ac5861267337085985e4445c14c54a7b72ad088a23f4f170d8b24b5363d9166df562dfa36482821eedbfc09b00509e265d1cd9b982b18
-
SSDEEP
24:ev1GSFGFajE/K3tQ3zSaJ2IkM6Pv617s3h/LjpKpuMA6QWTIANDPsa:qFGFajFK3zSIe7h/TMpQWTNTsa
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext
-