General
-
Target
JaffaCakes118_b95d9a9e10c64b454f9ace6ae0a039a57ff0e7921b3ac0b986ac4319dcaa522a
-
Size
1.3MB
-
Sample
241224-29qj4azpdy
-
MD5
40baa29f34ad98e8da78c62cca32b05d
-
SHA1
f4ea5f94b1e8b6e9eeb0e69d1a71b8deb067b99e
-
SHA256
b95d9a9e10c64b454f9ace6ae0a039a57ff0e7921b3ac0b986ac4319dcaa522a
-
SHA512
546548d220dbeb96dbaae9b7adbc6ce2a547e2e8562e12d5ef5c71104d2688d572ceb7211f3516d18c3ddce105cf1e3a1463c9f74e5c33f4d11664683ea0c844
-
SSDEEP
24576:3+fj9XCRoLrxzDEa3kS4wZJc1eDKxvTGoJ8eidlqkzko8Z/EIoJLo0mt30m:3ylXdIAkN0Z2vzodlio8Snodt3R
Static task
static1
Behavioral task
behavioral1
Sample
2021Աְ/list1.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2021Աְ/list1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2021Աְ/list2.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
2021Աְ/list2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
2021Աְ/ְб.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2021Աְ/ְб.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/download_exec
http://110.157.231.33:80/css/_utf.gif?id=18721
- headers Host: picc.com.cn Cookie: QiHooGUID=C9FA6432AF75.1573373412127; User-Agent: Mozilla/5.0 (Linux; Android 4.1.1; Nexus 7 Build/JRO03D) AppleWebKit/535.19 (KHTML, like Gecko)
Targets
-
-
Target
2021Աְ/list1.jpg
-
Size
1.5MB
-
MD5
8f1fbc7a48cde68378a6dc4064cbce7f
-
SHA1
95a1ae099595ce68542984d6ef6c1ed031f8b931
-
SHA256
553e460f0ae4e43668dd8d717ab40b0a1ba1941bb0c7918795ea12f861556ce1
-
SHA512
e4b837769e886c2fa95816353a49b5bf17ead78f44ad4040d2d6c9bcdfc44c2b0e44f01bfd45d3e3231375f4fed7ddfd6e6bd9d6e009066e82b13caf281bdcee
-
SSDEEP
24576:vUZrR/uqE3N85ctjcKGSg3GbNtQyQUnBBTn:v7qkdcKGSg4h1BT
Score3/10 -
-
-
Target
2021Աְ/list2.jpg
-
Size
176KB
-
MD5
081bd2c1ce9df69f5b6c6abacb75f403
-
SHA1
f1ae82059e950ae39f697fcffc20b2795d4ec991
-
SHA256
8b1d19a05dc2f30b8f876b2abf3651bae6f61cc425fbd6be2c5e0662981bf79e
-
SHA512
339be9bf9b0510d0011233a02d40623b3aa652c447306df5645ac1c43f57cfa28afa5883ce9b9606a7d8bd524cc7df76fed346563b873298eca80c4fb9f3075c
-
SSDEEP
3072:UeGfFChEXD/7J/pwiC9JJJoyPf/UREvu2HLJzodzCFZ/xAg0FujKSSaGwq2Ox:U/COz/t/Ki8bDnURAu2HacfAOfBq2Ox
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request
-
-
-
Target
2021Աְ/ְб.exe
-
Size
2.8MB
-
MD5
58c0358dff4bf8f2760ae7dcd5c8012e
-
SHA1
28a84efc59efa07e2d99d2cb8eb26f851864b296
-
SHA256
e9afde6620da93586c261d881c75f606bb6ada7937bd3ff17eb7bee0c414aa9b
-
SHA512
d3cc06badac46d28ff50e5be3df45a5118eec847f1582ef06cb565d351c7c1bbef66c2ad95e831fb7ffb320f8b0f0d63d474cc4ecbd4d41bced124af5bc00f1c
-
SSDEEP
24576:j3dadNasA928VeQTCh+y6Moc2E9Q2xza3WiLQzMT3b75m:Javg2uBTCh+y6MorE9QeZiUSb75m
Score1/10 -