General
-
Target
JaffaCakes118_7a7bb93bce111aca14143890b812fed4
-
Size
167KB
-
Sample
250104-s33fmsxqgl
-
MD5
7a7bb93bce111aca14143890b812fed4
-
SHA1
4c2861efdf32de91c29015690a67c96e746d13e6
-
SHA256
b9a3dfc84f175df261cea1f38830a476dbf290573ce4f363d78c76afa1759a24
-
SHA512
f99255b98cd286ed8c2dcc62d2d18154ef7c4467ab923c05c32ed1a2121f2f4b5143cd882599767c80611621aa67e00fc18687cac08ca01231674bc394897ad6
-
SSDEEP
3072:qZDtpSLETxfdEH3qxyXSGMCa6IXWThRsZz6K/Hqm0v:kWCfdAqxyiGMBGhRtgHJm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a7bb93bce111aca14143890b812fed4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7a7bb93bce111aca14143890b812fed4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7a7bb93bce111aca14143890b812fed4
-
Size
167KB
-
MD5
7a7bb93bce111aca14143890b812fed4
-
SHA1
4c2861efdf32de91c29015690a67c96e746d13e6
-
SHA256
b9a3dfc84f175df261cea1f38830a476dbf290573ce4f363d78c76afa1759a24
-
SHA512
f99255b98cd286ed8c2dcc62d2d18154ef7c4467ab923c05c32ed1a2121f2f4b5143cd882599767c80611621aa67e00fc18687cac08ca01231674bc394897ad6
-
SSDEEP
3072:qZDtpSLETxfdEH3qxyXSGMCa6IXWThRsZz6K/Hqm0v:kWCfdAqxyiGMBGhRtgHJm
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-