General
-
Target
JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8
-
Size
221KB
-
Sample
250418-aqkqysyms6
-
MD5
bbc7b46f6d0713910da177ae15a0a7e8
-
SHA1
7a1f17df1956019475445b02d2b6cf0219f8ea8b
-
SHA256
63a0481af7fbbb4f1b32728d90e00bd860e7172aa7be4cac9aa8023422534dab
-
SHA512
1563365b484f55309a534e69b3655ce276d3b24f809af7f0be04bdacc7dbb2c748a27dfd988307126d24788e1cd4484345ae2f0268314de96dd0e7e992868e05
-
SSDEEP
6144:/gU6qjunLsOI2bKmLPbBnBmVxEYMUe+lntZGprGegxE:/1uLsOIO/PbBBmETUe+ZtZAYxE
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8.exe
Resource
win11-20250410-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8
-
Size
221KB
-
MD5
bbc7b46f6d0713910da177ae15a0a7e8
-
SHA1
7a1f17df1956019475445b02d2b6cf0219f8ea8b
-
SHA256
63a0481af7fbbb4f1b32728d90e00bd860e7172aa7be4cac9aa8023422534dab
-
SHA512
1563365b484f55309a534e69b3655ce276d3b24f809af7f0be04bdacc7dbb2c748a27dfd988307126d24788e1cd4484345ae2f0268314de96dd0e7e992868e05
-
SSDEEP
6144:/gU6qjunLsOI2bKmLPbBnBmVxEYMUe+lntZGprGegxE:/1uLsOIO/PbBBmETUe+ZtZAYxE
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-