General
-
Target
JaffaCakes118_785483038efcd32b3be7758ad35ea82c
-
Size
172KB
-
Sample
250116-q6pb3stkb1
-
MD5
785483038efcd32b3be7758ad35ea82c
-
SHA1
0543845b921d1b4f34c26c730831f8a9732563b2
-
SHA256
106c9788b44d9566a95c7a2a273495fe20e60b4bca8e4b5f114763388d47dfe8
-
SHA512
9877dc7a8d8aea12b8253b60fbc629adbf52899bc682c150f73fc51f070ffc76413e52a22c18e2f9d6b860e0b5daa0d969b8de329e1edcd21a6b8eee0a6fadde
-
SSDEEP
3072:97p4RD9L54Gj+Zz/RKQq3niuwI0UD1U4w7ejvTYxD/PcLJWA:RS19yxVpKQ6z1U4w8TYxzH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_785483038efcd32b3be7758ad35ea82c.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_785483038efcd32b3be7758ad35ea82c
-
Size
172KB
-
MD5
785483038efcd32b3be7758ad35ea82c
-
SHA1
0543845b921d1b4f34c26c730831f8a9732563b2
-
SHA256
106c9788b44d9566a95c7a2a273495fe20e60b4bca8e4b5f114763388d47dfe8
-
SHA512
9877dc7a8d8aea12b8253b60fbc629adbf52899bc682c150f73fc51f070ffc76413e52a22c18e2f9d6b860e0b5daa0d969b8de329e1edcd21a6b8eee0a6fadde
-
SSDEEP
3072:97p4RD9L54Gj+Zz/RKQq3niuwI0UD1U4w7ejvTYxD/PcLJWA:RS19yxVpKQ6z1U4w8TYxzH
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-