General
-
Target
JaffaCakes118_16c890c72f9f83d6212d989965d14380
-
Size
180KB
-
Sample
250112-yfgtbaynhm
-
MD5
16c890c72f9f83d6212d989965d14380
-
SHA1
c998dfa6a3f73f4f753dcc8af12a16d15f25e9b6
-
SHA256
2cfeb29b64598fc88385b451a9b6aa20ebb2070b89e4a88f61b6f4abf96e954f
-
SHA512
7a62d69b3c6f64170bc709600879f65e580c680c295de688e16e98f6d99437146db91514c1aa396d4f83750687cba8b1cd4ce9e95d01d657b776bd60bd7adf06
-
SSDEEP
3072:JwSYYWu17R6G8oZd1lW+gVK8Z1LOStDIxc9G1TykAZtCc+mL:LvDrfZDeKe7UVkjCcx
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16c890c72f9f83d6212d989965d14380.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_16c890c72f9f83d6212d989965d14380
-
Size
180KB
-
MD5
16c890c72f9f83d6212d989965d14380
-
SHA1
c998dfa6a3f73f4f753dcc8af12a16d15f25e9b6
-
SHA256
2cfeb29b64598fc88385b451a9b6aa20ebb2070b89e4a88f61b6f4abf96e954f
-
SHA512
7a62d69b3c6f64170bc709600879f65e580c680c295de688e16e98f6d99437146db91514c1aa396d4f83750687cba8b1cd4ce9e95d01d657b776bd60bd7adf06
-
SSDEEP
3072:JwSYYWu17R6G8oZd1lW+gVK8Z1LOStDIxc9G1TykAZtCc+mL:LvDrfZDeKe7UVkjCcx
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-