General
-
Target
JaffaCakes118_da2648cc4a24a89b3c60ce081cd49bf9
-
Size
169KB
-
Sample
250120-dlaxqsyjb1
-
MD5
da2648cc4a24a89b3c60ce081cd49bf9
-
SHA1
b791027bf511611435f3834f9f2647cca12cdf3c
-
SHA256
110ac32455bbb0ba2cf58decbd69e5e7df5d9cf3e33094826164b16f4b9a80b3
-
SHA512
b6db1cdad199644a3300bd5784aabff5b9cc593b8ae4630f25eee381940070f0cd9b50329dcbb6ec38ff561f90b71f6edfa7aec407526b4ad4cc9630d5480247
-
SSDEEP
3072:hmUamulpsZsMfhuR4Lg0n7jp1ZbGnfJLGL0JarzXFT/2z1tB:hpaJbsZb5uR4LgG7jfZbMhLGL0SzXgz9
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_da2648cc4a24a89b3c60ce081cd49bf9.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_da2648cc4a24a89b3c60ce081cd49bf9
-
Size
169KB
-
MD5
da2648cc4a24a89b3c60ce081cd49bf9
-
SHA1
b791027bf511611435f3834f9f2647cca12cdf3c
-
SHA256
110ac32455bbb0ba2cf58decbd69e5e7df5d9cf3e33094826164b16f4b9a80b3
-
SHA512
b6db1cdad199644a3300bd5784aabff5b9cc593b8ae4630f25eee381940070f0cd9b50329dcbb6ec38ff561f90b71f6edfa7aec407526b4ad4cc9630d5480247
-
SSDEEP
3072:hmUamulpsZsMfhuR4Lg0n7jp1ZbGnfJLGL0JarzXFT/2z1tB:hpaJbsZb5uR4LgG7jfZbMhLGL0SzXgz9
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-