General

  • Target

    b4961731a649665ccee47fa4e10b85355640e182b148460e47068f27ab220e44N.exe

  • Size

    169KB

  • Sample

    241204-3a2zhsslal

  • MD5

    b6e91af58e0d4dcd60afe30adfdd0730

  • SHA1

    73ba3ebd344cc3255e1127c248a6cfebd965cb43

  • SHA256

    b4961731a649665ccee47fa4e10b85355640e182b148460e47068f27ab220e44

  • SHA512

    84b5cacf9b54055c6195d2d0fb8d0dcc148326e79494a3d2128f8227ef676a513b63748901e423646ae67eaee9898964d5aaf4736225a86fdb54d1ff4fcb0bf2

  • SSDEEP

    3072:pYtI3xw7+scZSKf9OnYqjbsYUdhV+ZF+Q0kx+p9s4lgUBS9Rh/duUk:pP3xeNcZSKf9yYosXdhTksp9IdE

Malware Config

Targets

    • Target

      b4961731a649665ccee47fa4e10b85355640e182b148460e47068f27ab220e44N.exe

    • Size

      169KB

    • MD5

      b6e91af58e0d4dcd60afe30adfdd0730

    • SHA1

      73ba3ebd344cc3255e1127c248a6cfebd965cb43

    • SHA256

      b4961731a649665ccee47fa4e10b85355640e182b148460e47068f27ab220e44

    • SHA512

      84b5cacf9b54055c6195d2d0fb8d0dcc148326e79494a3d2128f8227ef676a513b63748901e423646ae67eaee9898964d5aaf4736225a86fdb54d1ff4fcb0bf2

    • SSDEEP

      3072:pYtI3xw7+scZSKf9OnYqjbsYUdhV+ZF+Q0kx+p9s4lgUBS9Rh/duUk:pP3xeNcZSKf9yYosXdhTksp9IdE

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks