General
-
Target
ed14d36ef751292185845576e9310e1b_JaffaCakes118
-
Size
191KB
-
Sample
241213-2r4c8sslem
-
MD5
ed14d36ef751292185845576e9310e1b
-
SHA1
af05b4d1399e6b101ac91d0a1024c7838b15d09c
-
SHA256
e9732b3134c86949f6bb3b983a490bdd77a8edfe1b6f3122a3560341948a644f
-
SHA512
128a4fcff995814705ccacf3ba527b4718eefb48e0a259af97609ccd0729499d3f51bdeeb184e8d2d2e02da33ecca9ed4410a916a64e4424a5124bebd7e387a1
-
SSDEEP
3072:u8Jms5o+YrlOhGOyy8KaBiQbBvEBGhxXEvIxntMut9jwJRF8ejb+O8Ak9NJ:u8JmCF3h7yhKuH1vEQFEvINSuDjkgqKl
Static task
static1
Behavioral task
behavioral1
Sample
ed14d36ef751292185845576e9310e1b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed14d36ef751292185845576e9310e1b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ed14d36ef751292185845576e9310e1b_JaffaCakes118
-
Size
191KB
-
MD5
ed14d36ef751292185845576e9310e1b
-
SHA1
af05b4d1399e6b101ac91d0a1024c7838b15d09c
-
SHA256
e9732b3134c86949f6bb3b983a490bdd77a8edfe1b6f3122a3560341948a644f
-
SHA512
128a4fcff995814705ccacf3ba527b4718eefb48e0a259af97609ccd0729499d3f51bdeeb184e8d2d2e02da33ecca9ed4410a916a64e4424a5124bebd7e387a1
-
SSDEEP
3072:u8Jms5o+YrlOhGOyy8KaBiQbBvEBGhxXEvIxntMut9jwJRF8ejb+O8Ak9NJ:u8JmCF3h7yhKuH1vEQFEvINSuDjkgqKl
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-