General
-
Target
e85fa12ac36d0bb243227325072eee77_JaffaCakes118
-
Size
165KB
-
Sample
241212-1dvy9sxrfy
-
MD5
e85fa12ac36d0bb243227325072eee77
-
SHA1
d12d5f59c3bbb4f779e90b2cb6fbd1ce710bf795
-
SHA256
b5778f8e8fcc1d06f0a684a383883f83ced63f980573463eba2381c09bf1e19d
-
SHA512
a8cf247c95af609557041cc88c3cb1e3cd34bbeb4b85422c5615d9476b8fd06d056b4e379136f14bf250dd166975ea3f9accaa0f9ed912b62436dc1be62bfbf0
-
SSDEEP
3072:XBOz/2NsqcjZ/A8JCFtPdIkR6ZgLDPVT7m4nPfkQZO:RaGcjegCjPdd6yF7m4PfB
Static task
static1
Behavioral task
behavioral1
Sample
e85fa12ac36d0bb243227325072eee77_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
e85fa12ac36d0bb243227325072eee77_JaffaCakes118
-
Size
165KB
-
MD5
e85fa12ac36d0bb243227325072eee77
-
SHA1
d12d5f59c3bbb4f779e90b2cb6fbd1ce710bf795
-
SHA256
b5778f8e8fcc1d06f0a684a383883f83ced63f980573463eba2381c09bf1e19d
-
SHA512
a8cf247c95af609557041cc88c3cb1e3cd34bbeb4b85422c5615d9476b8fd06d056b4e379136f14bf250dd166975ea3f9accaa0f9ed912b62436dc1be62bfbf0
-
SSDEEP
3072:XBOz/2NsqcjZ/A8JCFtPdIkR6ZgLDPVT7m4nPfkQZO:RaGcjegCjPdd6yF7m4PfB
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-