General

  • Target

    c37258219d57d97b495db272a7c303ad_JaffaCakes118

  • Size

    183KB

  • Sample

    241204-t82a7swrck

  • MD5

    c37258219d57d97b495db272a7c303ad

  • SHA1

    32a6b1f687a55a127a02dbab0966fcc833adff33

  • SHA256

    a2dad09c0ac6cc2e6cc570b25666b102db4f29013895aed5855b34cc12dd1375

  • SHA512

    ec59e9c2426484da73274c640466ed0356c12885d22a0968142790c97238a1651b9a40c829d045d27c0db8ed4bd0831540fa66347a9778b2568fabd743e8a80f

  • SSDEEP

    3072:zYyuXQyRVQSmbvwM/3nQ5cQbB+urBu3gz0i6oKtN7Ks2Hok59HRmIfhtBv/XRRvq:ZESSOwEXQ+QXuwzB6ogJKPrJfhvPRxzG

Malware Config

Targets

    • Target

      c37258219d57d97b495db272a7c303ad_JaffaCakes118

    • Size

      183KB

    • MD5

      c37258219d57d97b495db272a7c303ad

    • SHA1

      32a6b1f687a55a127a02dbab0966fcc833adff33

    • SHA256

      a2dad09c0ac6cc2e6cc570b25666b102db4f29013895aed5855b34cc12dd1375

    • SHA512

      ec59e9c2426484da73274c640466ed0356c12885d22a0968142790c97238a1651b9a40c829d045d27c0db8ed4bd0831540fa66347a9778b2568fabd743e8a80f

    • SSDEEP

      3072:zYyuXQyRVQSmbvwM/3nQ5cQbB+urBu3gz0i6oKtN7Ks2Hok59HRmIfhtBv/XRRvq:ZESSOwEXQ+QXuwzB6ogJKPrJfhvPRxzG

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks