General
-
Target
JaffaCakes118_997c1372e3467df9d6f4289b38e86078
-
Size
275KB
-
Sample
250331-kz3m8swtev
-
MD5
997c1372e3467df9d6f4289b38e86078
-
SHA1
bd437e1e4aea26e071144fd70a7afae03a34b4b8
-
SHA256
0466b478af51a21795b89ce82b979dc9e7b78434ff04f42d2b609833562132c9
-
SHA512
41f52653ac29fef2737e436e08219d112dbb83bf3b7eb189b271dd32c99268c444e9bcc9bb77c0eabc092c910560a6d11001e93eeb0fb75f054b89afd553a489
-
SSDEEP
6144:49l2jtbWFPZDsFZxbzIWfI+/4tnTiytXWW:QwjtbsORzIuEnt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_997c1372e3467df9d6f4289b38e86078.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_997c1372e3467df9d6f4289b38e86078
-
Size
275KB
-
MD5
997c1372e3467df9d6f4289b38e86078
-
SHA1
bd437e1e4aea26e071144fd70a7afae03a34b4b8
-
SHA256
0466b478af51a21795b89ce82b979dc9e7b78434ff04f42d2b609833562132c9
-
SHA512
41f52653ac29fef2737e436e08219d112dbb83bf3b7eb189b271dd32c99268c444e9bcc9bb77c0eabc092c910560a6d11001e93eeb0fb75f054b89afd553a489
-
SSDEEP
6144:49l2jtbWFPZDsFZxbzIWfI+/4tnTiytXWW:QwjtbsORzIuEnt
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies WinLogon for persistence
-
Pony family
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-