General
-
Target
JaffaCakes118_a12a8f0a0d9d98503d1625b14bfc387d
-
Size
484KB
-
Sample
250408-xrle7syyez
-
MD5
a12a8f0a0d9d98503d1625b14bfc387d
-
SHA1
093dd9c23451b42fdc2fef447ff38c32e0d38c98
-
SHA256
1b9227ed19b251e129378e26e69ec4426ef826e10ac3a7ca29cfbdd4e993e5c8
-
SHA512
5b409161682924db3a8106a90fe88797b443f57f7bc0d073501f928017b28bc567ae3b42625bd206bab8eb1ce94dcd0f6e34746584d2f027c4e5397e976004c9
-
SSDEEP
12288:sP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:sPoBHch+uudKNffiv1aVSaPTeO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a12a8f0a0d9d98503d1625b14bfc387d.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
JaffaCakes118_a12a8f0a0d9d98503d1625b14bfc387d
-
Size
484KB
-
MD5
a12a8f0a0d9d98503d1625b14bfc387d
-
SHA1
093dd9c23451b42fdc2fef447ff38c32e0d38c98
-
SHA256
1b9227ed19b251e129378e26e69ec4426ef826e10ac3a7ca29cfbdd4e993e5c8
-
SHA512
5b409161682924db3a8106a90fe88797b443f57f7bc0d073501f928017b28bc567ae3b42625bd206bab8eb1ce94dcd0f6e34746584d2f027c4e5397e976004c9
-
SSDEEP
12288:sP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:sPoBHch+uudKNffiv1aVSaPTeO
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2