General
-
Target
14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118
-
Size
205KB
-
Sample
240627-fq5c9atdnd
-
MD5
14c613eacb7f9c1835b80ab6348ff6c3
-
SHA1
b42865b06cdcb6a989fa416ff81591a71f0f58dd
-
SHA256
53de1c650ac0cb007b3b4200d7b67ee885efd3ca5fb835930f510a0475c5f4c2
-
SHA512
85afa5c4d5c7535f5b37c628d87146983914e19fee549f0eb5de60641f73b3b6efcee36bf2387b966f02a57e8e39622ff9738e873c8d1a283f931aecf8e62ab6
-
SSDEEP
6144:tWGB1mSxXmVmXPCITMxG4yYOLW//RpbymQGm1HnYl0QM:EOTXsmXPCdG4fq4/zymQGyHnYy
Behavioral task
behavioral1
Sample
14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.172.252:443
Targets
-
-
Target
14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118
-
Size
205KB
-
MD5
14c613eacb7f9c1835b80ab6348ff6c3
-
SHA1
b42865b06cdcb6a989fa416ff81591a71f0f58dd
-
SHA256
53de1c650ac0cb007b3b4200d7b67ee885efd3ca5fb835930f510a0475c5f4c2
-
SHA512
85afa5c4d5c7535f5b37c628d87146983914e19fee549f0eb5de60641f73b3b6efcee36bf2387b966f02a57e8e39622ff9738e873c8d1a283f931aecf8e62ab6
-
SSDEEP
6144:tWGB1mSxXmVmXPCITMxG4yYOLW//RpbymQGm1HnYl0QM:EOTXsmXPCdG4fq4/zymQGyHnYy
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-