General
-
Target
JaffaCakes118_f88d4d084ed98937d3aec41a99577c85
-
Size
166KB
-
Sample
250120-zhvnmaxrgq
-
MD5
f88d4d084ed98937d3aec41a99577c85
-
SHA1
1db36babbe61a9a4bc7acc7b1b1f6e1d85d052c8
-
SHA256
11dbfd2d2b0b7d9b1eef6a2d88a027635b61594964f041d7a95aea4f0a885c54
-
SHA512
3677fbd8ccea612f02935ae005c7f8ce029955ecda1a57369dabff40417f600d02f0cd9b9bc12e20ab762e982992edc45af1e60cf01a8bc5a60f67698dfcf13f
-
SSDEEP
3072:gJumkEoT7gNXU/piZ8Gfduqllj0dk/VduxPVJh00BWwu5ViLGJ+:gJFkEG7gNXUxCVhlT4oKWC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f88d4d084ed98937d3aec41a99577c85.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_f88d4d084ed98937d3aec41a99577c85
-
Size
166KB
-
MD5
f88d4d084ed98937d3aec41a99577c85
-
SHA1
1db36babbe61a9a4bc7acc7b1b1f6e1d85d052c8
-
SHA256
11dbfd2d2b0b7d9b1eef6a2d88a027635b61594964f041d7a95aea4f0a885c54
-
SHA512
3677fbd8ccea612f02935ae005c7f8ce029955ecda1a57369dabff40417f600d02f0cd9b9bc12e20ab762e982992edc45af1e60cf01a8bc5a60f67698dfcf13f
-
SSDEEP
3072:gJumkEoT7gNXU/piZ8Gfduqllj0dk/VduxPVJh00BWwu5ViLGJ+:gJFkEG7gNXUxCVhlT4oKWC
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Adds Run key to start application
-