General
-
Target
JaffaCakes118_e4c12f08e0c03904b5200596609d5231
-
Size
177KB
-
Sample
250120-mt9wgavpez
-
MD5
e4c12f08e0c03904b5200596609d5231
-
SHA1
4ad4cdaaa16ada0bf27620ed1844398383179c75
-
SHA256
228bd8068b315ebc1cea134b8fd5671a98e2d461bb022a2d424ce7f9ce789eea
-
SHA512
4cf7be51a04a75e3e1ca8c3cded26842931b080dc3047761fbc22f9dde222cb9d688110bb5ddb9344ee4b9aa09c3383043dc5cd5f44e312c41891702cbb39395
-
SSDEEP
3072:+ankJ1tiZLuzHQkJZ2e/efuytO7OkS0ge2EkP9Pc7BUjNhwnaD+QZ:+b1tA0wkJj/epO7OagblyBGhp+QZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e4c12f08e0c03904b5200596609d5231.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_e4c12f08e0c03904b5200596609d5231
-
Size
177KB
-
MD5
e4c12f08e0c03904b5200596609d5231
-
SHA1
4ad4cdaaa16ada0bf27620ed1844398383179c75
-
SHA256
228bd8068b315ebc1cea134b8fd5671a98e2d461bb022a2d424ce7f9ce789eea
-
SHA512
4cf7be51a04a75e3e1ca8c3cded26842931b080dc3047761fbc22f9dde222cb9d688110bb5ddb9344ee4b9aa09c3383043dc5cd5f44e312c41891702cbb39395
-
SSDEEP
3072:+ankJ1tiZLuzHQkJZ2e/efuytO7OkS0ge2EkP9Pc7BUjNhwnaD+QZ:+b1tA0wkJj/epO7OagblyBGhp+QZ
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-