General
-
Target
ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118
-
Size
186KB
-
Sample
241206-yz5z9a1nem
-
MD5
ced1f01a9493b7e7c71009ae01d3751e
-
SHA1
10ba64e83ddbff3699f0e59460da6295d2bed8c9
-
SHA256
7bc2d42ea9d50ec35613c734f23425e5cd76da7351579acf4d87420def398b53
-
SHA512
88879b54560edf816d6799a4b86fd7cffeb584fbfe0c94701cd71e52b78709aa0081d3a284c197e69e776f14a3038aa993d55ce64955bee65d76338deda928e7
-
SSDEEP
3072:zP3WsdS1L203WShsHCB2hxJhltdN4CxQOKN6qwygOWnqqaa6oD3cCyTu8vcPIbR:zPGFp6HCaxxTN4i+6qw88qqaa6ecJTp/
Static task
static1
Behavioral task
behavioral1
Sample
ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118
-
Size
186KB
-
MD5
ced1f01a9493b7e7c71009ae01d3751e
-
SHA1
10ba64e83ddbff3699f0e59460da6295d2bed8c9
-
SHA256
7bc2d42ea9d50ec35613c734f23425e5cd76da7351579acf4d87420def398b53
-
SHA512
88879b54560edf816d6799a4b86fd7cffeb584fbfe0c94701cd71e52b78709aa0081d3a284c197e69e776f14a3038aa993d55ce64955bee65d76338deda928e7
-
SSDEEP
3072:zP3WsdS1L203WShsHCB2hxJhltdN4CxQOKN6qwygOWnqqaa6oD3cCyTu8vcPIbR:zPGFp6HCaxxTN4i+6qw88qqaa6ecJTp/
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-