General
-
Target
JaffaCakes118_a41afc015c670ea53e8f611c0bab5165
-
Size
166KB
-
Sample
250409-ke2v7svxhv
-
MD5
a41afc015c670ea53e8f611c0bab5165
-
SHA1
3f9fafd85dfd5c2d4103a76aa0f58f7d2a8d186b
-
SHA256
35e7558ea5e568e8c393cee2c7568c143de3f4bb9a834006dc828d3f3462d1fd
-
SHA512
c2f7be51e861c6d643c477a272430897c6c40a1be38448c71410f5249741d7f93928bbd98e2bac973fbf3685584a49ed1baece1b2758c2e8cb892688c65759a2
-
SSDEEP
3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB
Static task
static1
Malware Config
Targets
-
-
Target
JaffaCakes118_a41afc015c670ea53e8f611c0bab5165
-
Size
166KB
-
MD5
a41afc015c670ea53e8f611c0bab5165
-
SHA1
3f9fafd85dfd5c2d4103a76aa0f58f7d2a8d186b
-
SHA256
35e7558ea5e568e8c393cee2c7568c143de3f4bb9a834006dc828d3f3462d1fd
-
SHA512
c2f7be51e861c6d643c477a272430897c6c40a1be38448c71410f5249741d7f93928bbd98e2bac973fbf3685584a49ed1baece1b2758c2e8cb892688c65759a2
-
SSDEEP
3072:vufEwW90LLrjzeNaDaW1S2XyabQNPxPHtHTk8cRB:2sF0eJW1rNbuFA8oB
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Executes dropped EXE
-
Adds Run key to start application
-