General

  • Target

    946e8ff61e80aeec138f70fd244eecd7e7afbfb799ee73b20a1a92f9fc939c25.exe

  • Size

    200KB

  • Sample

    241127-hztn8azlhm

  • MD5

    6aca963aaa7d2f49985d1d718d5006ab

  • SHA1

    0e6fd5804a3bc8b904eb7849fc2e6eedd1d823e1

  • SHA256

    946e8ff61e80aeec138f70fd244eecd7e7afbfb799ee73b20a1a92f9fc939c25

  • SHA512

    bc638dc67fb722802c0d2e3e67a810524a08ca44cc4f8c93c3c1854919f829675ff18d61a70e37a0298a6ed452f1bf2357e1ee265d38392528cf69a98e143faf

  • SSDEEP

    6144:8Mz73Q1X5oRzlOu8oUh/3wf2GR34t34jyUY:8o7345oRYlho+GR34hMW

Malware Config

Targets

    • Target

      946e8ff61e80aeec138f70fd244eecd7e7afbfb799ee73b20a1a92f9fc939c25.exe

    • Size

      200KB

    • MD5

      6aca963aaa7d2f49985d1d718d5006ab

    • SHA1

      0e6fd5804a3bc8b904eb7849fc2e6eedd1d823e1

    • SHA256

      946e8ff61e80aeec138f70fd244eecd7e7afbfb799ee73b20a1a92f9fc939c25

    • SHA512

      bc638dc67fb722802c0d2e3e67a810524a08ca44cc4f8c93c3c1854919f829675ff18d61a70e37a0298a6ed452f1bf2357e1ee265d38392528cf69a98e143faf

    • SSDEEP

      6144:8Mz73Q1X5oRzlOu8oUh/3wf2GR34t34jyUY:8o7345oRYlho+GR34hMW

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks