General
-
Target
f85a69eb1e7069208389ab6da9c06865_JaffaCakes118
-
Size
165KB
-
Sample
241216-lcpcrstqhx
-
MD5
f85a69eb1e7069208389ab6da9c06865
-
SHA1
cbaa4a1d3cc96c034c42281bc671d90bf8533c41
-
SHA256
266cb4041236f6dd70a4709321690030ab63ff84aebe41ea8b4b6acd7503c18d
-
SHA512
1ca18d54de4cfce342eab678578de027ee5f8d0fb9a651f7ed777f8d3b9c54c21173b8bf5708ff76d65f2317062584ffb9d561c2d79aba6955a9da9ac783d318
-
SSDEEP
3072:L7veQjYvOs+/P0cdFVTWNdSdDcbu/Rr/pnAvWBb6Ud6:utvOd/PZVTWWdRjVAvWkUd
Static task
static1
Behavioral task
behavioral1
Sample
f85a69eb1e7069208389ab6da9c06865_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
f85a69eb1e7069208389ab6da9c06865_JaffaCakes118
-
Size
165KB
-
MD5
f85a69eb1e7069208389ab6da9c06865
-
SHA1
cbaa4a1d3cc96c034c42281bc671d90bf8533c41
-
SHA256
266cb4041236f6dd70a4709321690030ab63ff84aebe41ea8b4b6acd7503c18d
-
SHA512
1ca18d54de4cfce342eab678578de027ee5f8d0fb9a651f7ed777f8d3b9c54c21173b8bf5708ff76d65f2317062584ffb9d561c2d79aba6955a9da9ac783d318
-
SSDEEP
3072:L7veQjYvOs+/P0cdFVTWNdSdDcbu/Rr/pnAvWBb6Ud6:utvOd/PZVTWWdRjVAvWkUd
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-