General
-
Target
JaffaCakes118_8d6dc593348ca7c4130ace16014c839113e053c32b0aad090ffd2605a63664b0
-
Size
4.7MB
-
Sample
241226-tztj1a1kcj
-
MD5
fc595b1bd200a573cf48b01ab3ae4162
-
SHA1
dad3351779976f6bdc5163048f94d65224f59422
-
SHA256
8d6dc593348ca7c4130ace16014c839113e053c32b0aad090ffd2605a63664b0
-
SHA512
b3d4271f1ea00f54045fa5b471c1a8bd82148f8fb5e5e0cda1e2e22604e32bcebb3f18d114b579c6357c64bd3aea2714f34892d68c694f0a25bbc905de19445e
-
SSDEEP
98304:03VPtZAzKaFlgxPQpBdyOD2g4CKcC4jueR7f0bEv6PujJNKE4WQCNX:aVczjlgxIBseVsv0rBfAo6SDKrWQiX
Static task
static1
Behavioral task
behavioral1
Sample
b8990f204ca595e23562aa8063fd163651771626ba4acf45890f25315616fc1e.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://91.241.19.207:443/97EP_udjldzcTt1PvRKMhAxlqtuNLZq19NohJ2anZLpZuTJHmyyT5YFzm
Targets
-
-
Target
b8990f204ca595e23562aa8063fd163651771626ba4acf45890f25315616fc1e
-
Size
6.0MB
-
MD5
b2de6e79656610e61aeb54529ca6f618
-
SHA1
7320fba8d48c7d1c122f2a56e2bfd7554da3bb8a
-
SHA256
b8990f204ca595e23562aa8063fd163651771626ba4acf45890f25315616fc1e
-
SHA512
4b545c8a6351d2bf9ced772ba10d97d6f3a279e77353de77edd223c78331c24003e224f49f5b343e3a36be3079b982625b0fca078def73f3bfd4e585ad0e433d
-
SSDEEP
98304:mH7CgqLPRPYv7cZuwYx72XPo0+XH6zVjAcJya7GLmlv9OHwqmFNlG4tg/uLqxBAX:C+gqLKB2pEcDyadvlDtyuC+IK0G
-
Babadeda Crypter
-
Babadeda family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-