General
-
Target
JaffaCakes118_98a3cd52a7b6c1b7dc03c9eb996288b5
-
Size
187KB
-
Sample
250330-n14tgazqv8
-
MD5
98a3cd52a7b6c1b7dc03c9eb996288b5
-
SHA1
57492c6ea0eab1a8e1ff104acfc024cfb1f142eb
-
SHA256
0d37b18f8b97c4a6e43caaa799f6edda14d8e481c32e0fe0872e587eb0c65ec2
-
SHA512
f62dc6b21de9f35510e4e92bcc81730921730513a32f14ebf7798d1f996cc18c1d305ca7259410a781c7edb92ce739eaf8dc19c27d2f777acae80e724363cfd5
-
SSDEEP
3072:8Y0OQhbF1NPHP56DeKqvBSXeYhZfjnc8uuUfZuLRJHMhEy4A7Vv3kqj60/:8Yaj5vaJqvwjOhuLbMhcAB/9jr/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98a3cd52a7b6c1b7dc03c9eb996288b5.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_98a3cd52a7b6c1b7dc03c9eb996288b5
-
Size
187KB
-
MD5
98a3cd52a7b6c1b7dc03c9eb996288b5
-
SHA1
57492c6ea0eab1a8e1ff104acfc024cfb1f142eb
-
SHA256
0d37b18f8b97c4a6e43caaa799f6edda14d8e481c32e0fe0872e587eb0c65ec2
-
SHA512
f62dc6b21de9f35510e4e92bcc81730921730513a32f14ebf7798d1f996cc18c1d305ca7259410a781c7edb92ce739eaf8dc19c27d2f777acae80e724363cfd5
-
SSDEEP
3072:8Y0OQhbF1NPHP56DeKqvBSXeYhZfjnc8uuUfZuLRJHMhEy4A7Vv3kqj60/:8Yaj5vaJqvwjOhuLbMhcAB/9jr/
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Executes dropped EXE
-
Adds Run key to start application
-