General
-
Target
JaffaCakes118_5ea5f4529955c637d17536e8760c3835
-
Size
46KB
-
Sample
250101-wdh79aykfp
-
MD5
5ea5f4529955c637d17536e8760c3835
-
SHA1
e35dfedf008cb143f3ebc6cbbee498edbd935177
-
SHA256
6932f5c845848c3b8d283d7cd805830eac4d1052fa39b95ef0691e957be2a417
-
SHA512
ffff3eb8d822e3fc237f8fc6be5cdefebed68ca82f45f2254250be80091d26684abb9477746a8d438c3e5167071cc1bff0d927b9438b21412e726beed197c58c
-
SSDEEP
768:oJOuKOVbv+18TV6VjnY5MTbmN5iRCaXC0FpL8fSlzXsJycERLj9loJ4UkQD/FdP:oJOuKOOkuY5WijiRnFpQ+sJbmlomJQDD
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ea5f4529955c637d17536e8760c3835.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5ea5f4529955c637d17536e8760c3835.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
JaffaCakes118_5ea5f4529955c637d17536e8760c3835
-
Size
46KB
-
MD5
5ea5f4529955c637d17536e8760c3835
-
SHA1
e35dfedf008cb143f3ebc6cbbee498edbd935177
-
SHA256
6932f5c845848c3b8d283d7cd805830eac4d1052fa39b95ef0691e957be2a417
-
SHA512
ffff3eb8d822e3fc237f8fc6be5cdefebed68ca82f45f2254250be80091d26684abb9477746a8d438c3e5167071cc1bff0d927b9438b21412e726beed197c58c
-
SSDEEP
768:oJOuKOVbv+18TV6VjnY5MTbmN5iRCaXC0FpL8fSlzXsJycERLj9loJ4UkQD/FdP:oJOuKOOkuY5WijiRnFpQ+sJbmlomJQDD
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-