Behavioral task
behavioral1
Sample
cobalt2.ps1
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
JaffaCakes118_9df082131558420cde6a0c93a61c235728f49de184549260f0a3596337c07bf5
-
Size
2KB
-
MD5
c10c92f3f091ded1eaa79c6813f558ba
-
SHA1
30c0359321586703f941984c7e6bc2f0c7f4af86
-
SHA256
9df082131558420cde6a0c93a61c235728f49de184549260f0a3596337c07bf5
-
SHA512
d1f79dcb43c19b9e1918c9abd0d0f7e0270615e797c5b1e7980d61d2716129191792934ef169b3c050cea52bfab1166429f5c6eeccee11c362f08f37248f39ab
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
windows/download_exec
C2
http://widisusez.com:443/design/sources/BP2NKQRYF2NI
Signatures
-
Metasploit family
Files
-
JaffaCakes118_9df082131558420cde6a0c93a61c235728f49de184549260f0a3596337c07bf5.zip
Password: infected
-
cobalt2.ps1.ps1