General
-
Target
JaffaCakes118_8e0a6787d446d2043bf1b04f829ae3b7d22df8c2f885b865674dc49859244502
-
Size
211KB
-
Sample
241228-3evq1avqdj
-
MD5
bb4ebd709a8963d7e0e40961536c9c61
-
SHA1
03be65d1cb2a97e4fe9b0ae1d8931b14d5366387
-
SHA256
8e0a6787d446d2043bf1b04f829ae3b7d22df8c2f885b865674dc49859244502
-
SHA512
39a9679ff1977e3599db5166456bbfb87eb47104d7aefcb2264e947e866da0b1e55796f26b4653a7402fc5871e51366242180274e8cd9cfc5114e94d96414676
-
SSDEEP
6144:6Lv8+EMlvnd4J0QCck7nou04pr8sid6/A:3+EM9d4/Cc8ou4sidD
Static task
static1
Behavioral task
behavioral1
Sample
2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/download_exec
http://georgiaonsale.com:443/task.html /start.html /smm.html /cal.html?usersid=hw#########-##
Targets
-
-
Target
2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd
-
Size
383KB
-
MD5
58d62f826da094b6ab7da7e0c1e05a23
-
SHA1
ca53b321d55c1ddbe0194f71e07ba26c1a8ec40d
-
SHA256
2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd
-
SHA512
136d97ad71550fc17335dfbcc92ab181f4446afab5b94891d334e0f034465b47010c8cadd986b73615c3fe65485d46b3d913c945a683a6e4cb7aa763437f81b5
-
SSDEEP
6144:VedlOgSNOqgVndy73viT5jSoLY4c8Hs/x68uSUtiL9xoqd2nrC9rhkIPuyxs3B8j:VedUjOqqy+TLY4sc8uSUkL9x1d1kIPu0
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-