General
-
Target
9997e42eeb6977b50e78bad12c90b587_JaffaCakes118
-
Size
169KB
-
Sample
241125-gjygssxqbq
-
MD5
9997e42eeb6977b50e78bad12c90b587
-
SHA1
9dc7b2b9414a74154985fbcfcc2ebf887c7ed959
-
SHA256
b671331ac12768b61e3eff47445629fdab91a876884f999c3663a4ec40dad3fc
-
SHA512
c3c69092cc3ce63d8bbfc7d272c9e0bebf65177447cc0860619f1d3843862838bfb74ca6ba20a15fc0e5e213ded980e0f3c354171e84ac7be84ab50f376e3b86
-
SSDEEP
3072:urhKBvV3YgyGWb/0UkrYEnYOLhhjQ7ieoeIJiZM/bfYwGNR3ovttT+uxN:l93GGYEn9vQ7i2LZv3YvttF
Static task
static1
Behavioral task
behavioral1
Sample
9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9997e42eeb6977b50e78bad12c90b587_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9997e42eeb6977b50e78bad12c90b587_JaffaCakes118
-
Size
169KB
-
MD5
9997e42eeb6977b50e78bad12c90b587
-
SHA1
9dc7b2b9414a74154985fbcfcc2ebf887c7ed959
-
SHA256
b671331ac12768b61e3eff47445629fdab91a876884f999c3663a4ec40dad3fc
-
SHA512
c3c69092cc3ce63d8bbfc7d272c9e0bebf65177447cc0860619f1d3843862838bfb74ca6ba20a15fc0e5e213ded980e0f3c354171e84ac7be84ab50f376e3b86
-
SSDEEP
3072:urhKBvV3YgyGWb/0UkrYEnYOLhhjQ7ieoeIJiZM/bfYwGNR3ovttT+uxN:l93GGYEn9vQ7i2LZv3YvttF
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1