General
-
Target
JaffaCakes118_a2c793e5586953616c24b7f2fc8d7a2f86797ad4eec4e457e551792bb4b8707c
-
Size
3.4MB
-
Sample
241223-tlgchstrbs
-
MD5
36ee9c4e7d686e75e767dd7eb49eafd8
-
SHA1
e758f2b1ae6fe455c22c0c57faebd163f2ea4243
-
SHA256
a2c793e5586953616c24b7f2fc8d7a2f86797ad4eec4e457e551792bb4b8707c
-
SHA512
2c67a03ec7e2a0660269ef930fd37668f49c77ea41507d7d5ebb8f9d95a617b214d3934de134c8d6aee361159846a84ff17586d96b78183d9fd1d06f797181d2
-
SSDEEP
98304:UuClR5uraVqJNTcWSAWdJlslEJrzirJbzARcX/j6g:ZCH5uOEjcWS3Jl+urozARcX/j9
Static task
static1
Behavioral task
behavioral1
Sample
important.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
important.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
F:\!Please Read Me!.txt
3JFgm9SMRxSP9YWPZiSCsezXvWZS5aTsaR
Targets
-
-
Target
important.bin
-
Size
3.5MB
-
MD5
18a4199cdc67767f148535e57d26cb1c
-
SHA1
e4da84914bcd047f84d2065097098bea676835bb
-
SHA256
9af8cf4ddaab23832526a008ffab1fa8606dea6eff0eddab55ce88866b79eb31
-
SHA512
d3f470eb1a5de29ee45b96f706e84cf8ad5e652278b8afa2236f8597e88f2f9abc6436757544544787f0ef6b9e63b79cf83743bd3ffbde552ea5df65c92acf57
-
SSDEEP
98304:aeZ/bzQdEMgMsae2FhINt+WFsqQMyuyKFCz54IS0k76qe6VrpmPrq:hZ/bzrMgMsae2jK+WtQPQvIa6qe0pmPG
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Renames multiple (68) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-