General
-
Target
JaffaCakes118_8888145b33aa163e5735260c9ee4059c
-
Size
172KB
-
Sample
250117-l78pwssmh1
-
MD5
8888145b33aa163e5735260c9ee4059c
-
SHA1
d9745a72ba82507e6ce9013367aa93a89eec03c9
-
SHA256
aed03500ea174b94cd4382ddf03af3fdbf45df423f3099c9be69cf76abb588c2
-
SHA512
7bd1c54dc88eece2bd6c3f3b5cdf9c985a531d1429714d7b533cfc0b5b2a57beb71d00a5c865536bee7847e0abee61107ee31c5acb3cc09f3f15142682738273
-
SSDEEP
3072:boqDGUf0RRfoJLDw76Ixeki38ETjMqcE:boqY0LO6IxekisEa
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8888145b33aa163e5735260c9ee4059c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_8888145b33aa163e5735260c9ee4059c
-
Size
172KB
-
MD5
8888145b33aa163e5735260c9ee4059c
-
SHA1
d9745a72ba82507e6ce9013367aa93a89eec03c9
-
SHA256
aed03500ea174b94cd4382ddf03af3fdbf45df423f3099c9be69cf76abb588c2
-
SHA512
7bd1c54dc88eece2bd6c3f3b5cdf9c985a531d1429714d7b533cfc0b5b2a57beb71d00a5c865536bee7847e0abee61107ee31c5acb3cc09f3f15142682738273
-
SSDEEP
3072:boqDGUf0RRfoJLDw76Ixeki38ETjMqcE:boqY0LO6IxekisEa
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-