General
-
Target
9d55b2dd2b9a54a36a7eca1a9b99322b_JaffaCakes118
-
Size
176KB
-
Sample
241125-xnv58sxpbm
-
MD5
9d55b2dd2b9a54a36a7eca1a9b99322b
-
SHA1
d53ebbbf5b63224a2e7eed6227ee3ae615271b08
-
SHA256
b1cb6eecb0a98d7a71ce720e19f949627958842c902404b145cffd60b005c8ea
-
SHA512
e545634c0a4f398b3c49a437b730fc6216f308d4998b92102574eb829e34dfa61588717c5cd99716cb4c635f065e425e2844972c97f18f713bc9dad326393253
-
SSDEEP
3072:GJ4ujspDuTsIDV/gWtgapfGOLxJUgi9WSV4x7KEigdG:GJtwSsIJ/g9apeOLjb6VV4M
Static task
static1
Behavioral task
behavioral1
Sample
9d55b2dd2b9a54a36a7eca1a9b99322b_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
9d55b2dd2b9a54a36a7eca1a9b99322b_JaffaCakes118
-
Size
176KB
-
MD5
9d55b2dd2b9a54a36a7eca1a9b99322b
-
SHA1
d53ebbbf5b63224a2e7eed6227ee3ae615271b08
-
SHA256
b1cb6eecb0a98d7a71ce720e19f949627958842c902404b145cffd60b005c8ea
-
SHA512
e545634c0a4f398b3c49a437b730fc6216f308d4998b92102574eb829e34dfa61588717c5cd99716cb4c635f065e425e2844972c97f18f713bc9dad326393253
-
SSDEEP
3072:GJ4ujspDuTsIDV/gWtgapfGOLxJUgi9WSV4x7KEigdG:GJtwSsIJ/g9apeOLjb6VV4M
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-