General
-
Target
JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4
-
Size
166KB
-
Sample
250113-a65q3axmhx
-
MD5
1c8f3ac2263bb7f996ee7685ed3d84e4
-
SHA1
bbe0e7a306b021674dde855ae3abb18ecf7c421d
-
SHA256
4e62c11c9b8197de0d44869bb9710576341fe37301e931c4b8da665961652c4f
-
SHA512
97c4d4876b068c404ef0b8f4bc1d55fe3523f25805c16fb075bd42faa834a85cc867a033d0dd6cd6bdc0ea742ed38c7b1ec6d88a32279d11747cf471e3f2ba0f
-
SSDEEP
3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_1c8f3ac2263bb7f996ee7685ed3d84e4
-
Size
166KB
-
MD5
1c8f3ac2263bb7f996ee7685ed3d84e4
-
SHA1
bbe0e7a306b021674dde855ae3abb18ecf7c421d
-
SHA256
4e62c11c9b8197de0d44869bb9710576341fe37301e931c4b8da665961652c4f
-
SHA512
97c4d4876b068c404ef0b8f4bc1d55fe3523f25805c16fb075bd42faa834a85cc867a033d0dd6cd6bdc0ea742ed38c7b1ec6d88a32279d11747cf471e3f2ba0f
-
SSDEEP
3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-