General

  • Target

    JaffaCakes118_89cde44af0cfeb4c250472c60cce1fa9

  • Size

    134KB

  • Sample

    250327-q9myesvm13

  • MD5

    89cde44af0cfeb4c250472c60cce1fa9

  • SHA1

    2aa4c7960cbd02a3088505d8404283c0a7971b5b

  • SHA256

    e86f36c943e1fc9ffa80ae4277012ebf8fbea64271ea3953a16cf1edcf3c71ca

  • SHA512

    5ecd1d75854d3b872dca906f8888d0aa2d762d2cdd12c0c1980f598f31300a8874724994c512ea9cde4d69110ded5800eee4c6c2b4a20e58a645951cd3a72e06

  • SSDEEP

    1536:oQD/Id/4cNIFOHCDEWj3LRR3sPCqOSRy1/Xa0nBv5XLQugf9g7bYnrwMF9Biou+:/gd/4FLDEWjleMSRglIX

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_89cde44af0cfeb4c250472c60cce1fa9

    • Size

      134KB

    • MD5

      89cde44af0cfeb4c250472c60cce1fa9

    • SHA1

      2aa4c7960cbd02a3088505d8404283c0a7971b5b

    • SHA256

      e86f36c943e1fc9ffa80ae4277012ebf8fbea64271ea3953a16cf1edcf3c71ca

    • SHA512

      5ecd1d75854d3b872dca906f8888d0aa2d762d2cdd12c0c1980f598f31300a8874724994c512ea9cde4d69110ded5800eee4c6c2b4a20e58a645951cd3a72e06

    • SSDEEP

      1536:oQD/Id/4cNIFOHCDEWj3LRR3sPCqOSRy1/Xa0nBv5XLQugf9g7bYnrwMF9Biou+:/gd/4FLDEWjleMSRglIX

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.