General
-
Target
e56bd279edd15266f11a5e3bb081e104_JaffaCakes118
-
Size
164KB
-
Sample
241212-jwn51axpgy
-
MD5
e56bd279edd15266f11a5e3bb081e104
-
SHA1
84b61f645ea8e3d7cae0218bab928364b76dcf13
-
SHA256
d1f3de6e126cf7c820584a2e831c1173c94ca71683f4909fefa57da860c729ab
-
SHA512
9b51ab6c78c4dc7560c4e41daa3ed3f95d8092b95af334d9f1904edc08b5622f194e2341e21feaa34ac319e646a8fb8d25e3a0f87068481c4e52d9271f80bdbf
-
SSDEEP
3072:ENKOAQ+iq4PLId7Uqxo09anlkupJjcdMScUITd3h+YI:EgmzTINXdotJBScPxox
Static task
static1
Behavioral task
behavioral1
Sample
e56bd279edd15266f11a5e3bb081e104_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e56bd279edd15266f11a5e3bb081e104_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e56bd279edd15266f11a5e3bb081e104_JaffaCakes118
-
Size
164KB
-
MD5
e56bd279edd15266f11a5e3bb081e104
-
SHA1
84b61f645ea8e3d7cae0218bab928364b76dcf13
-
SHA256
d1f3de6e126cf7c820584a2e831c1173c94ca71683f4909fefa57da860c729ab
-
SHA512
9b51ab6c78c4dc7560c4e41daa3ed3f95d8092b95af334d9f1904edc08b5622f194e2341e21feaa34ac319e646a8fb8d25e3a0f87068481c4e52d9271f80bdbf
-
SSDEEP
3072:ENKOAQ+iq4PLId7Uqxo09anlkupJjcdMScUITd3h+YI:EgmzTINXdotJBScPxox
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-