General
-
Target
JaffaCakes118_5117fbcd0183e295cabb023a91d042f9
-
Size
165KB
-
Sample
250115-jqttaswlew
-
MD5
5117fbcd0183e295cabb023a91d042f9
-
SHA1
058e6e685816ebe67e75e46e6417dc74dc3516d4
-
SHA256
4d841be30baeac58cce53882da63938c22cb125413cb9f33c90c3082b275b617
-
SHA512
c6990713179133d433a7ed33a8c5eee57954a31875bd32054630fd68e39b67db447fe88c04d5b5eb242bcee6c6c60c925331492ed4e8c3ac5402c62782e264ad
-
SSDEEP
3072:ftec/ahkaBnTFaByG6OLeYAVOIiyzy7qTvGmZkiYi/HlGm046yBP:Ac/aCUnMYGNCdOIiyzyGQ+x
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5117fbcd0183e295cabb023a91d042f9.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5117fbcd0183e295cabb023a91d042f9
-
Size
165KB
-
MD5
5117fbcd0183e295cabb023a91d042f9
-
SHA1
058e6e685816ebe67e75e46e6417dc74dc3516d4
-
SHA256
4d841be30baeac58cce53882da63938c22cb125413cb9f33c90c3082b275b617
-
SHA512
c6990713179133d433a7ed33a8c5eee57954a31875bd32054630fd68e39b67db447fe88c04d5b5eb242bcee6c6c60c925331492ed4e8c3ac5402c62782e264ad
-
SSDEEP
3072:ftec/ahkaBnTFaByG6OLeYAVOIiyzy7qTvGmZkiYi/HlGm046yBP:Ac/aCUnMYGNCdOIiyzyGQ+x
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-