General

  • Target

    9952abc44ad4eb194320ea9bb8296615_JaffaCakes118

  • Size

    191KB

  • Sample

    241125-fgzfmsvqgk

  • MD5

    9952abc44ad4eb194320ea9bb8296615

  • SHA1

    68275841d45499218883490365cf5364d97e3303

  • SHA256

    dbf9b3c5f5ba63c3a609ae779430735500197573bb79ef45b4334b8771d06ff6

  • SHA512

    1916cab3b103df7c22a9e76ed8614c7c348b018abe11c7dc552f2af3c2f4728febe9c22f898b2fe26ff5945aff8dc379cb05822736b82ade624c91642295db33

  • SSDEEP

    3072:A+oIaI6uXaI3FnKz4jqzpYixUMjmfyxFrGPgnNZT1Fa2oBA3m4VU8UInRKpjaFSF:A+oIa5eh3VkpgOePyNRT3m38TUpGo9wI

Malware Config

Targets

    • Target

      9952abc44ad4eb194320ea9bb8296615_JaffaCakes118

    • Size

      191KB

    • MD5

      9952abc44ad4eb194320ea9bb8296615

    • SHA1

      68275841d45499218883490365cf5364d97e3303

    • SHA256

      dbf9b3c5f5ba63c3a609ae779430735500197573bb79ef45b4334b8771d06ff6

    • SHA512

      1916cab3b103df7c22a9e76ed8614c7c348b018abe11c7dc552f2af3c2f4728febe9c22f898b2fe26ff5945aff8dc379cb05822736b82ade624c91642295db33

    • SSDEEP

      3072:A+oIaI6uXaI3FnKz4jqzpYixUMjmfyxFrGPgnNZT1Fa2oBA3m4VU8UInRKpjaFSF:A+oIa5eh3VkpgOePyNRT3m38TUpGo9wI

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks