General
-
Target
ec7dbb683dab64773c2e078349c8b42d_JaffaCakes118
-
Size
176KB
-
Sample
241213-vg2y4awqck
-
MD5
ec7dbb683dab64773c2e078349c8b42d
-
SHA1
57bfca8c885d5af870ad77fddf8c1d2825bb3f9f
-
SHA256
9d06c234179fbc06b11c66d5e5de79630ac1f6fa045a93394f11e80353d51150
-
SHA512
f9030fb149437ba3ddfe9c2c7b7c880523f381ffaa8a3c4d25bc28ea78b2701ce66a4141c1904b1e29d5e559539d3120413e296b52b2dbd2d515cc69e5e0f72b
-
SSDEEP
3072:TuAPwqxrVzjpz1in36COUxRKqovt7ecDU9FUxtKmRl7nb4luO2I:p7ztzQD5AFdDUIxR64O2
Static task
static1
Behavioral task
behavioral1
Sample
ec7dbb683dab64773c2e078349c8b42d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ec7dbb683dab64773c2e078349c8b42d_JaffaCakes118
-
Size
176KB
-
MD5
ec7dbb683dab64773c2e078349c8b42d
-
SHA1
57bfca8c885d5af870ad77fddf8c1d2825bb3f9f
-
SHA256
9d06c234179fbc06b11c66d5e5de79630ac1f6fa045a93394f11e80353d51150
-
SHA512
f9030fb149437ba3ddfe9c2c7b7c880523f381ffaa8a3c4d25bc28ea78b2701ce66a4141c1904b1e29d5e559539d3120413e296b52b2dbd2d515cc69e5e0f72b
-
SSDEEP
3072:TuAPwqxrVzjpz1in36COUxRKqovt7ecDU9FUxtKmRl7nb4luO2I:p7ztzQD5AFdDUIxR64O2
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-