General

  • Target

    ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118

  • Size

    186KB

  • Sample

    241206-yz5z9a1nem

  • MD5

    ced1f01a9493b7e7c71009ae01d3751e

  • SHA1

    10ba64e83ddbff3699f0e59460da6295d2bed8c9

  • SHA256

    7bc2d42ea9d50ec35613c734f23425e5cd76da7351579acf4d87420def398b53

  • SHA512

    88879b54560edf816d6799a4b86fd7cffeb584fbfe0c94701cd71e52b78709aa0081d3a284c197e69e776f14a3038aa993d55ce64955bee65d76338deda928e7

  • SSDEEP

    3072:zP3WsdS1L203WShsHCB2hxJhltdN4CxQOKN6qwygOWnqqaa6oD3cCyTu8vcPIbR:zPGFp6HCaxxTN4i+6qw88qqaa6ecJTp/

Malware Config

Targets

    • Target

      ced1f01a9493b7e7c71009ae01d3751e_JaffaCakes118

    • Size

      186KB

    • MD5

      ced1f01a9493b7e7c71009ae01d3751e

    • SHA1

      10ba64e83ddbff3699f0e59460da6295d2bed8c9

    • SHA256

      7bc2d42ea9d50ec35613c734f23425e5cd76da7351579acf4d87420def398b53

    • SHA512

      88879b54560edf816d6799a4b86fd7cffeb584fbfe0c94701cd71e52b78709aa0081d3a284c197e69e776f14a3038aa993d55ce64955bee65d76338deda928e7

    • SSDEEP

      3072:zP3WsdS1L203WShsHCB2hxJhltdN4CxQOKN6qwygOWnqqaa6oD3cCyTu8vcPIbR:zPGFp6HCaxxTN4i+6qw88qqaa6ecJTp/

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks