General

  • Target

    d0ba47b970fb65ef49b3b3c989dab7f5_JaffaCakes118

  • Size

    179KB

  • Sample

    241207-fe6ryasqar

  • MD5

    d0ba47b970fb65ef49b3b3c989dab7f5

  • SHA1

    0ca01adac0e147aab06647c272a815010b953769

  • SHA256

    acc481cc760cac57a034e9932d3f2d470c68f8df183963660a2009d650dc0b4b

  • SHA512

    9676554802bbb428d8486708c273dd9f3764b5ad534c7d225aaa42d32b6e11130fef3e6bd0c5d501d3d088705ccecd2e2c0c592cf5ddedb4b3b4b0158dc5632a

  • SSDEEP

    3072:Qvpp4K6gHfihdTAMqciIrCRSSINuE4uVmqfWVpkmvFbYdupGb3HSbtLnlr+6Z6nZ:yH46HfihdTAMsIrCvhE4uEqEvFbYdefX

Malware Config

Targets

    • Target

      d0ba47b970fb65ef49b3b3c989dab7f5_JaffaCakes118

    • Size

      179KB

    • MD5

      d0ba47b970fb65ef49b3b3c989dab7f5

    • SHA1

      0ca01adac0e147aab06647c272a815010b953769

    • SHA256

      acc481cc760cac57a034e9932d3f2d470c68f8df183963660a2009d650dc0b4b

    • SHA512

      9676554802bbb428d8486708c273dd9f3764b5ad534c7d225aaa42d32b6e11130fef3e6bd0c5d501d3d088705ccecd2e2c0c592cf5ddedb4b3b4b0158dc5632a

    • SSDEEP

      3072:Qvpp4K6gHfihdTAMqciIrCRSSINuE4uVmqfWVpkmvFbYdupGb3HSbtLnlr+6Z6nZ:yH46HfihdTAMsIrCvhE4uEqEvFbYdefX

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks