General
-
Target
d4b92584e58e5cddd62081ab7f46bcc8_JaffaCakes118
-
Size
186KB
-
Sample
241208-chmlpa1rdr
-
MD5
d4b92584e58e5cddd62081ab7f46bcc8
-
SHA1
74407ca367afb0e1cdc5a1218ea97a69a30b59d0
-
SHA256
cf6bf3538ecfcb163be8e124a73540604731b246f8d15fa4ffab184edd539b2d
-
SHA512
6be0a4542def4cf1f82300c7f2fbb071918ea038f5127d26061159019b369296a8ac104181d20b50486de5fbe95ca8dc436d6bcf4e032c48f3e0aa9586e3c0ac
-
SSDEEP
3072:UAD1/iHffLvRJwIdlznF6A1gFMHDxVXT9nE3TVd:UAD1/gffbv1JDFOV
Static task
static1
Behavioral task
behavioral1
Sample
d4b92584e58e5cddd62081ab7f46bcc8_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
d4b92584e58e5cddd62081ab7f46bcc8_JaffaCakes118
-
Size
186KB
-
MD5
d4b92584e58e5cddd62081ab7f46bcc8
-
SHA1
74407ca367afb0e1cdc5a1218ea97a69a30b59d0
-
SHA256
cf6bf3538ecfcb163be8e124a73540604731b246f8d15fa4ffab184edd539b2d
-
SHA512
6be0a4542def4cf1f82300c7f2fbb071918ea038f5127d26061159019b369296a8ac104181d20b50486de5fbe95ca8dc436d6bcf4e032c48f3e0aa9586e3c0ac
-
SSDEEP
3072:UAD1/iHffLvRJwIdlznF6A1gFMHDxVXT9nE3TVd:UAD1/gffbv1JDFOV
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-