General
-
Target
203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118
-
Size
380KB
-
Sample
240702-v91azaxhnl
-
MD5
203faeab73cd2cb1e4e588bc0628b8b0
-
SHA1
6d1692b64010b050f09ada59fb4a717aecdfce2c
-
SHA256
01fe98d1464dc41e6bb58188655dd4bc1f969726c6a7e5b2b1c88d52914a3742
-
SHA512
ddfdc090b41f419844d8e6c35c7dc411b3335ed516d9d25bd5b1c0046a3ada2fa173941ef6c360f937a4e9e825490bf6b694e177cfc593c3ce43d48763812efe
-
SSDEEP
6144:I9inN+UqL02g1gH2H4gCW3e0dZfFgCZTdsmnElM2/uLYwG2iIMRD51TK7HV/Smhc:0ipHgWYO1dTdxGmnO9/1Ft2SGjFW
Static task
static1
Behavioral task
behavioral1
Sample
203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118
-
Size
380KB
-
MD5
203faeab73cd2cb1e4e588bc0628b8b0
-
SHA1
6d1692b64010b050f09ada59fb4a717aecdfce2c
-
SHA256
01fe98d1464dc41e6bb58188655dd4bc1f969726c6a7e5b2b1c88d52914a3742
-
SHA512
ddfdc090b41f419844d8e6c35c7dc411b3335ed516d9d25bd5b1c0046a3ada2fa173941ef6c360f937a4e9e825490bf6b694e177cfc593c3ce43d48763812efe
-
SSDEEP
6144:I9inN+UqL02g1gH2H4gCW3e0dZfFgCZTdsmnElM2/uLYwG2iIMRD51TK7HV/Smhc:0ipHgWYO1dTdxGmnO9/1Ft2SGjFW
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-