General

  • Target

    c9f9737348a543e60117ab280dded5cd_JaffaCakes118

  • Size

    173KB

  • Sample

    241205-3s5hcsylbw

  • MD5

    c9f9737348a543e60117ab280dded5cd

  • SHA1

    6eb3695864b28ebe99b44e2bed88c1f924a3d26c

  • SHA256

    600407241da060c46887b337564359531405adfbfa92475a3100aaa559807ec5

  • SHA512

    c5a5c28e478cfe60f0a19990c4e815934b72e250b625d1f98d722c235c26e5a063459765e162521d4c4c2ea87dfb5b08267c45c362b799a387611b5f7207d455

  • SSDEEP

    3072:i9DX4mWWPLBFls716MUediJUBID4eJJ901FZnE5Fl90H9sTffK3M8fonrhWEByMv:iRFNLBFqXUtUSJy1Q5F0H9wq3Mi8DBHn

Malware Config

Targets

    • Target

      c9f9737348a543e60117ab280dded5cd_JaffaCakes118

    • Size

      173KB

    • MD5

      c9f9737348a543e60117ab280dded5cd

    • SHA1

      6eb3695864b28ebe99b44e2bed88c1f924a3d26c

    • SHA256

      600407241da060c46887b337564359531405adfbfa92475a3100aaa559807ec5

    • SHA512

      c5a5c28e478cfe60f0a19990c4e815934b72e250b625d1f98d722c235c26e5a063459765e162521d4c4c2ea87dfb5b08267c45c362b799a387611b5f7207d455

    • SSDEEP

      3072:i9DX4mWWPLBFls716MUediJUBID4eJJ901FZnE5Fl90H9sTffK3M8fonrhWEByMv:iRFNLBFqXUtUSJy1Q5F0H9wq3Mi8DBHn

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks