General
-
Target
JaffaCakes118_0624ab543750b24a452d8564426a368a
-
Size
276KB
-
Sample
250112-e4cdyswpds
-
MD5
0624ab543750b24a452d8564426a368a
-
SHA1
0f1e32bd73713397604bce6dbcc130e4391b1888
-
SHA256
1f6967d2b9a8ae24f5d8a44bd0c937b969eacb043a63986c45d599dc4d5ddfb8
-
SHA512
e25e441691a46af6c2b047e531e4bea71e28af5446219fb5b58b3723c14782ceca31107665b5d4caf87167b7000a3a800343314b7f2443e4cb3d65cfb6290be7
-
SSDEEP
6144:IhfAIAwdWYVPNQhxGe6AR4KWyZxeuedVMzjd5lI5IAs0lkF5ebS:pIRdBPqzX4sj5yyzjdPSIV0l25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0624ab543750b24a452d8564426a368a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0624ab543750b24a452d8564426a368a
-
Size
276KB
-
MD5
0624ab543750b24a452d8564426a368a
-
SHA1
0f1e32bd73713397604bce6dbcc130e4391b1888
-
SHA256
1f6967d2b9a8ae24f5d8a44bd0c937b969eacb043a63986c45d599dc4d5ddfb8
-
SHA512
e25e441691a46af6c2b047e531e4bea71e28af5446219fb5b58b3723c14782ceca31107665b5d4caf87167b7000a3a800343314b7f2443e4cb3d65cfb6290be7
-
SSDEEP
6144:IhfAIAwdWYVPNQhxGe6AR4KWyZxeuedVMzjd5lI5IAs0lkF5ebS:pIRdBPqzX4sj5yyzjdPSIV0l25
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-
Pony family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-