General
-
Target
f04c49ee2bfc17c0ad1f36946fa8b668_JaffaCakes118
-
Size
198KB
-
Sample
241214-x2gvrs1pgz
-
MD5
f04c49ee2bfc17c0ad1f36946fa8b668
-
SHA1
b07c956ae1ab20edf29ec9bee8c519e3fe69afd5
-
SHA256
8bd9d7bc3c342f415240066c32041c8f7a8f652913a653ce7c769a0ffb6039bb
-
SHA512
87bb3938e110db39a497e65a154ed115afd95caace0a805960898677a988f4cc33c803e9f666e58b4a965c907a8fcdaa79a5795d62df22baf0987fee93efcb46
-
SSDEEP
6144:x38zsLiX4ldI59IU3lCNrAk3d5VIBksoS9KQ:xM/IdW6r/d+NnK
Static task
static1
Behavioral task
behavioral1
Sample
f04c49ee2bfc17c0ad1f36946fa8b668_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f04c49ee2bfc17c0ad1f36946fa8b668_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f04c49ee2bfc17c0ad1f36946fa8b668_JaffaCakes118
-
Size
198KB
-
MD5
f04c49ee2bfc17c0ad1f36946fa8b668
-
SHA1
b07c956ae1ab20edf29ec9bee8c519e3fe69afd5
-
SHA256
8bd9d7bc3c342f415240066c32041c8f7a8f652913a653ce7c769a0ffb6039bb
-
SHA512
87bb3938e110db39a497e65a154ed115afd95caace0a805960898677a988f4cc33c803e9f666e58b4a965c907a8fcdaa79a5795d62df22baf0987fee93efcb46
-
SSDEEP
6144:x38zsLiX4ldI59IU3lCNrAk3d5VIBksoS9KQ:xM/IdW6r/d+NnK
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-
Suspicious use of SetThreadContext
-