General
-
Target
JaffaCakes118_1b5facb864ffd358bf31d164b2c340a5e5c2d83e3c9abdf3041953b9b7f48c1d
-
Size
350KB
-
Sample
241225-b416jatlez
-
MD5
32790df5701ff3f55b913d14e2efc5b8
-
SHA1
b10cbc28cafeb02df78d5e63a4a3fa158a27eb53
-
SHA256
1b5facb864ffd358bf31d164b2c340a5e5c2d83e3c9abdf3041953b9b7f48c1d
-
SHA512
fa9662984a65728269ceeef4fe79d5cc85423f29b4e250d94a6c4eb07fc8f54fb1119f675fa98e7d928b00bb6c0f5837f215cf671fce3dcd38f421ba98b00d0f
-
SSDEEP
6144:vIc8tI2T7DlTBRDLQYEx/P3J8+dMcJ3RNvslvuLfavwsMaI+3v2vR7Df47BOek:vIciIQ7DRQYExXZ/dMqjLytM7M7BO9
Behavioral task
behavioral1
Sample
63ff04bed4fdb120a9cb9b1ea7fd88e83f12fb01ab6a057088f8016e663b48d4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
63ff04bed4fdb120a9cb9b1ea7fd88e83f12fb01ab6a057088f8016e663b48d4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
185.63.90.137:4445
Targets
-
-
Target
63ff04bed4fdb120a9cb9b1ea7fd88e83f12fb01ab6a057088f8016e663b48d4
-
Size
1.5MB
-
MD5
f15ef7b1c22aa23fa5de99980501b2dc
-
SHA1
469b8da3181e65e9de0d3ce114dc92dc7f29f0fb
-
SHA256
63ff04bed4fdb120a9cb9b1ea7fd88e83f12fb01ab6a057088f8016e663b48d4
-
SHA512
42c61c212c048c463b9fea7c9a04754b367244ee6c5210afb6d3b26bd90371e8e47922db81a9a0928eb03b5ec312815f5b311cf88fe7d567800a59be7d6dd4cf
-
SSDEEP
24576:a4nXubIQGyxbPV0db26bVSSR0o6y2odSSR0o6y2B:aqe3f6NSSR0o6y2SSSR0o6y2
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-