General

  • Target

    d5284ab1af003d9f2a34c1279c06dafe_JaffaCakes118

  • Size

    172KB

  • Sample

    241208-encpsa1rey

  • MD5

    d5284ab1af003d9f2a34c1279c06dafe

  • SHA1

    633ec406ffaccf21a94d9e13200106d8a19a7658

  • SHA256

    42eafbd6c7be0dca12e0dbb2691010c9570983846e046f0617be49710b12ed8e

  • SHA512

    c70d427b21557832e4705eece34a7aa6b9e091b5b575b883bd954c0263de61cde4a5f3cc11e2c2f5c431bfc405e777afb3fdb58c3a9c77d25031e7e5b6802db5

  • SSDEEP

    3072:fYynmP47+9WXyb2R7eO9Y1n9Oc9s/i5a4WgDRVYTV5bBc+dMOb95:hk0iesnkce/i+gDITV5bPdRb95

Malware Config

Targets

    • Target

      d5284ab1af003d9f2a34c1279c06dafe_JaffaCakes118

    • Size

      172KB

    • MD5

      d5284ab1af003d9f2a34c1279c06dafe

    • SHA1

      633ec406ffaccf21a94d9e13200106d8a19a7658

    • SHA256

      42eafbd6c7be0dca12e0dbb2691010c9570983846e046f0617be49710b12ed8e

    • SHA512

      c70d427b21557832e4705eece34a7aa6b9e091b5b575b883bd954c0263de61cde4a5f3cc11e2c2f5c431bfc405e777afb3fdb58c3a9c77d25031e7e5b6802db5

    • SSDEEP

      3072:fYynmP47+9WXyb2R7eO9Y1n9Oc9s/i5a4WgDRVYTV5bBc+dMOb95:hk0iesnkce/i+gDITV5bPdRb95

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks