General

  • Target

    d2ca6453a391b7d8eb00d63e274ea843_JaffaCakes118

  • Size

    172KB

  • Sample

    241207-q9j7jatraw

  • MD5

    d2ca6453a391b7d8eb00d63e274ea843

  • SHA1

    14e107604480aeca6d669304cd08b65424a7247a

  • SHA256

    e6fe59b6a7ad957d5b8a67ae641a0008a6764c486f414a07860f738afb014f3d

  • SHA512

    c7908d6e481ddda83074fd391baf3f721fb3e3db75f7b6fcb2c49c592d749d7f9e5e7d018f6684957ab5d6e398716d16170059d0eebf70708de5ad3bb6846c55

  • SSDEEP

    3072:jq2M5+r3HZODwPm33bKAi5z5U8BRyCkfMTJAVw3zNB1/F3e/K0ih34:+2M5sOSu2JKCyW1/FeS0ihI

Malware Config

Targets

    • Target

      d2ca6453a391b7d8eb00d63e274ea843_JaffaCakes118

    • Size

      172KB

    • MD5

      d2ca6453a391b7d8eb00d63e274ea843

    • SHA1

      14e107604480aeca6d669304cd08b65424a7247a

    • SHA256

      e6fe59b6a7ad957d5b8a67ae641a0008a6764c486f414a07860f738afb014f3d

    • SHA512

      c7908d6e481ddda83074fd391baf3f721fb3e3db75f7b6fcb2c49c592d749d7f9e5e7d018f6684957ab5d6e398716d16170059d0eebf70708de5ad3bb6846c55

    • SSDEEP

      3072:jq2M5+r3HZODwPm33bKAi5z5U8BRyCkfMTJAVw3zNB1/F3e/K0ih34:+2M5sOSu2JKCyW1/FeS0ihI

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks