General
-
Target
e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118
-
Size
202KB
-
Sample
241212-e514ps1kds
-
MD5
e4b45a43e41484cff1f00bb8534500bd
-
SHA1
a83d58b6b21b568b1ca766508015c82705d1a496
-
SHA256
3a25ace61427f636b1ae70700031cb484af84555f7b93d11a7cbb102586a2f0c
-
SHA512
7a4d56695ebe04e5618b14b31dd9f4befaeabc885dbb940385abc79ab1d4e321c66a0fc5c9ffe590a168618c6261035342fd5f948f8026a70479d18f79794d03
-
SSDEEP
6144:qdaWg52l/KfoGZuyrIhg4/a4BUiqu/If:qEWgkykVajm/If
Static task
static1
Behavioral task
behavioral1
Sample
e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118
-
Size
202KB
-
MD5
e4b45a43e41484cff1f00bb8534500bd
-
SHA1
a83d58b6b21b568b1ca766508015c82705d1a496
-
SHA256
3a25ace61427f636b1ae70700031cb484af84555f7b93d11a7cbb102586a2f0c
-
SHA512
7a4d56695ebe04e5618b14b31dd9f4befaeabc885dbb940385abc79ab1d4e321c66a0fc5c9ffe590a168618c6261035342fd5f948f8026a70479d18f79794d03
-
SSDEEP
6144:qdaWg52l/KfoGZuyrIhg4/a4BUiqu/If:qEWgkykVajm/If
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-