General
-
Target
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118
-
Size
181KB
-
Sample
241212-229b8sskgq
-
MD5
e8b3747e27c2a5301ab052b00cb7481d
-
SHA1
a2eb7df8211fba3780f9b1373309ad61ee47de3f
-
SHA256
e8cda5bb3bf4a7c8d6c2cd7d15a4e73e8efe68b8df2bc0146a7540c59e489375
-
SHA512
d0f1118d81497a93a014d4b6f1904e605fdca0ca5615a66a830eb194a4228c75cc985d864fe395b168c15016f3fe16262d7605a5a61072a5774b82c242c4f32f
-
SSDEEP
3072:1lpe9xEv8NNV2yYaIXvGhXkykB9SgluCRXSAVWn+fTtYKh0RCA9qUGRQtnk:1zcxEu+yYaIXhyknSgluCRCBn+fTnCR4
Static task
static1
Behavioral task
behavioral1
Sample
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e8b3747e27c2a5301ab052b00cb7481d_JaffaCakes118
-
Size
181KB
-
MD5
e8b3747e27c2a5301ab052b00cb7481d
-
SHA1
a2eb7df8211fba3780f9b1373309ad61ee47de3f
-
SHA256
e8cda5bb3bf4a7c8d6c2cd7d15a4e73e8efe68b8df2bc0146a7540c59e489375
-
SHA512
d0f1118d81497a93a014d4b6f1904e605fdca0ca5615a66a830eb194a4228c75cc985d864fe395b168c15016f3fe16262d7605a5a61072a5774b82c242c4f32f
-
SSDEEP
3072:1lpe9xEv8NNV2yYaIXvGhXkykB9SgluCRXSAVWn+fTtYKh0RCA9qUGRQtnk:1zcxEu+yYaIXhyknSgluCRCBn+fTnCR4
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-