General
-
Target
JaffaCakes118_0b0993a5e841e323bd411033733b1aa5
-
Size
169KB
-
Sample
250112-lafylsymfl
-
MD5
0b0993a5e841e323bd411033733b1aa5
-
SHA1
f73c29322d8ab5674dfc4b8fb088963fd5837b27
-
SHA256
69dacf3eed77673675322108c043f74a6ff39150d7d6df18f449c000dab95ac4
-
SHA512
ae894a1ebad8b8d4e1198819096a584dde3e81b4c5e04737300da3cf7513131476eb37009f9c5fab07e58e6de3b00582b863d2662529967aeb1d3f0d1e70dd20
-
SSDEEP
3072:wD0f7eo/zMJ9NNx0m41Ps3JiKwRvic9a:wojemMJ9NNGf14ifNz9a
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0b0993a5e841e323bd411033733b1aa5.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0b0993a5e841e323bd411033733b1aa5
-
Size
169KB
-
MD5
0b0993a5e841e323bd411033733b1aa5
-
SHA1
f73c29322d8ab5674dfc4b8fb088963fd5837b27
-
SHA256
69dacf3eed77673675322108c043f74a6ff39150d7d6df18f449c000dab95ac4
-
SHA512
ae894a1ebad8b8d4e1198819096a584dde3e81b4c5e04737300da3cf7513131476eb37009f9c5fab07e58e6de3b00582b863d2662529967aeb1d3f0d1e70dd20
-
SSDEEP
3072:wD0f7eo/zMJ9NNx0m41Ps3JiKwRvic9a:wojemMJ9NNGf14ifNz9a
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-