General
-
Target
JaffaCakes118_0ec4d8770f84e5be90f352e0910625bd
-
Size
276KB
-
Sample
250112-ptzrlsvmgr
-
MD5
0ec4d8770f84e5be90f352e0910625bd
-
SHA1
4cec9a115c523d01fd75efb463dd8dae459c61bb
-
SHA256
2903bc0712af918391f81c64d2b6af36479979043aa487c91d0786a6eace9142
-
SHA512
f9e59f9f87cadb54d1882ae1e2c196007e13f00319d1cc01d2e6ce9e30e58e65f25596a71b3be611e23ce4c38014aeea14d9a998e9dbf67be6344606f4f93eea
-
SSDEEP
6144:FxVdGcywMRU9n7WKccpZQoYeGvdgLE6791I9NQdku:FxVdcbOR7WK7jB2Sf7918NQ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0ec4d8770f84e5be90f352e0910625bd.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0ec4d8770f84e5be90f352e0910625bd
-
Size
276KB
-
MD5
0ec4d8770f84e5be90f352e0910625bd
-
SHA1
4cec9a115c523d01fd75efb463dd8dae459c61bb
-
SHA256
2903bc0712af918391f81c64d2b6af36479979043aa487c91d0786a6eace9142
-
SHA512
f9e59f9f87cadb54d1882ae1e2c196007e13f00319d1cc01d2e6ce9e30e58e65f25596a71b3be611e23ce4c38014aeea14d9a998e9dbf67be6344606f4f93eea
-
SSDEEP
6144:FxVdGcywMRU9n7WKccpZQoYeGvdgLE6791I9NQdku:FxVdcbOR7WK7jB2Sf7918NQ
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-
Pony family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-