General
-
Target
JaffaCakes118_ba1947b8d4ec4a6cb8374931160827da
-
Size
220KB
-
Sample
250119-cbdefa1pcz
-
MD5
ba1947b8d4ec4a6cb8374931160827da
-
SHA1
dd1f286416aa3896d6318f5048147cb8cfe73dda
-
SHA256
6f6445a629c8fff724d2a1ad61a5487011308f2b3a72236072d45026f34bcc09
-
SHA512
8dd2badfe8e3dea12f15b9e2d8278c4227ff2a4be028e8cf6e141e602205ae014b5709fc14a2a03808396df263899f6a144815fa277bc7df5f646a45f5fa0702
-
SSDEEP
6144:lwkwJej1coHvEf1e2a16Po3u0q3dM5KxSW3Y:Fke5coHYQ2k6fX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ba1947b8d4ec4a6cb8374931160827da.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ba1947b8d4ec4a6cb8374931160827da.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_ba1947b8d4ec4a6cb8374931160827da
-
Size
220KB
-
MD5
ba1947b8d4ec4a6cb8374931160827da
-
SHA1
dd1f286416aa3896d6318f5048147cb8cfe73dda
-
SHA256
6f6445a629c8fff724d2a1ad61a5487011308f2b3a72236072d45026f34bcc09
-
SHA512
8dd2badfe8e3dea12f15b9e2d8278c4227ff2a4be028e8cf6e141e602205ae014b5709fc14a2a03808396df263899f6a144815fa277bc7df5f646a45f5fa0702
-
SSDEEP
6144:lwkwJej1coHvEf1e2a16Po3u0q3dM5KxSW3Y:Fke5coHYQ2k6fX
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-
Suspicious use of SetThreadContext
-