General
-
Target
ea635810a0cbf6b490bb36bb807526fc_JaffaCakes118
-
Size
174KB
-
Sample
241213-hgnegssqhm
-
MD5
ea635810a0cbf6b490bb36bb807526fc
-
SHA1
ed058bfc1a381d6ed054c6e0db091224aed63782
-
SHA256
045f7e4cf53b37c38b8ef23b29ab8e5f9282aad9418542738d54d7116169ba22
-
SHA512
6201a609956cdf5d3daf9f8c4ba966b7e09a8b293cb156d8f1c0aec04299bc0f0439b56d38b6d95412b67878482bf899c10a2c14e58d4b7b9883bfd88000102a
-
SSDEEP
3072:2DyxASvS6A2VnAcRDzGF3ZCf8kA+HFJQ+udou:2DyxAfr10DldAwFdHu
Static task
static1
Behavioral task
behavioral1
Sample
ea635810a0cbf6b490bb36bb807526fc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ea635810a0cbf6b490bb36bb807526fc_JaffaCakes118
-
Size
174KB
-
MD5
ea635810a0cbf6b490bb36bb807526fc
-
SHA1
ed058bfc1a381d6ed054c6e0db091224aed63782
-
SHA256
045f7e4cf53b37c38b8ef23b29ab8e5f9282aad9418542738d54d7116169ba22
-
SHA512
6201a609956cdf5d3daf9f8c4ba966b7e09a8b293cb156d8f1c0aec04299bc0f0439b56d38b6d95412b67878482bf899c10a2c14e58d4b7b9883bfd88000102a
-
SSDEEP
3072:2DyxASvS6A2VnAcRDzGF3ZCf8kA+HFJQ+udou:2DyxAfr10DldAwFdHu
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-