General
-
Target
d0c38cd762eb6d565496f4271b05ecc6_JaffaCakes118
-
Size
161KB
-
Sample
241207-fmkvfatjfj
-
MD5
d0c38cd762eb6d565496f4271b05ecc6
-
SHA1
85a5819bf3b9afbdebc1d44ada6262475ec730b7
-
SHA256
b853a74b3d13056bf54211da6cfe3ec0abb997b940f75fceb66b0ec60937cf09
-
SHA512
800406d6a3eee1ec8e80ab180bb1511661200cc915598e7d03eb9b015e5b1808187f697d7ed605fc6765b165ed3309b7d2798deae8152dcc9db22309d5d0c395
-
SSDEEP
3072:owpq/0zyNk6Et4/rRZtkjzbXGMcU62IiuJJtsQ5:rthidOG/UmiyJt
Static task
static1
Behavioral task
behavioral1
Sample
d0c38cd762eb6d565496f4271b05ecc6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0c38cd762eb6d565496f4271b05ecc6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d0c38cd762eb6d565496f4271b05ecc6_JaffaCakes118
-
Size
161KB
-
MD5
d0c38cd762eb6d565496f4271b05ecc6
-
SHA1
85a5819bf3b9afbdebc1d44ada6262475ec730b7
-
SHA256
b853a74b3d13056bf54211da6cfe3ec0abb997b940f75fceb66b0ec60937cf09
-
SHA512
800406d6a3eee1ec8e80ab180bb1511661200cc915598e7d03eb9b015e5b1808187f697d7ed605fc6765b165ed3309b7d2798deae8152dcc9db22309d5d0c395
-
SSDEEP
3072:owpq/0zyNk6Et4/rRZtkjzbXGMcU62IiuJJtsQ5:rthidOG/UmiyJt
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-