General
-
Target
JaffaCakes118_617cbbefd15e6c358d640d5d7befab72
-
Size
164KB
-
Sample
250102-ajelcsvjfj
-
MD5
617cbbefd15e6c358d640d5d7befab72
-
SHA1
86a567ac4e966fd1442c866fb8e335914eb62109
-
SHA256
7ce5e5a51e5fe662b5c359ea11af3c88b7e2e71b5f63583c989ca1ca1fe3e7ff
-
SHA512
9f620b691f05b6b78502fd88f2bf1f152b54363aab4a54a0dd70e0ca400da8b7e45e3ac58e2dc149371fab73e1da6d5bd97c8769e2f386ddef26395d040b5da6
-
SSDEEP
3072:JtOBwK0TlLm8lirVlOJARb1X28BVmXIVWTjj3vfo69c:J8BO61ZlnzuXIVyHI6+
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_617cbbefd15e6c358d640d5d7befab72.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
JaffaCakes118_617cbbefd15e6c358d640d5d7befab72
-
Size
164KB
-
MD5
617cbbefd15e6c358d640d5d7befab72
-
SHA1
86a567ac4e966fd1442c866fb8e335914eb62109
-
SHA256
7ce5e5a51e5fe662b5c359ea11af3c88b7e2e71b5f63583c989ca1ca1fe3e7ff
-
SHA512
9f620b691f05b6b78502fd88f2bf1f152b54363aab4a54a0dd70e0ca400da8b7e45e3ac58e2dc149371fab73e1da6d5bd97c8769e2f386ddef26395d040b5da6
-
SSDEEP
3072:JtOBwK0TlLm8lirVlOJARb1X28BVmXIVWTjj3vfo69c:J8BO61ZlnzuXIVyHI6+
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-