General

  • Target

    db39fb128dc44cb20cbf623de0f41a7d_JaffaCakes118

  • Size

    158KB

  • Sample

    241209-ye2r4aymgx

  • MD5

    db39fb128dc44cb20cbf623de0f41a7d

  • SHA1

    6601ceee77a4e876bae0370ee69c4aa7dbcdb0b3

  • SHA256

    620c39cbecebe9f1efdc516a73c0446ed22d7f3111b530ef14c19860e275c5ba

  • SHA512

    988d1d42e9abf1797816044c65f746b57bc178b1f0af7574f7fb21dd4238d1cd51356fcab9a42e7910129dcd75a6133b0aa888487b274cb31f46de7d711542b4

  • SSDEEP

    3072:GHGiRUuWQbEr4l+A+dsvYuAVRLvbYQCECc0W8pFJVtIBeN9Db8L:GmivWQ/lkM7ihvYy0W8PJV6Bsu

Malware Config

Targets

    • Target

      db39fb128dc44cb20cbf623de0f41a7d_JaffaCakes118

    • Size

      158KB

    • MD5

      db39fb128dc44cb20cbf623de0f41a7d

    • SHA1

      6601ceee77a4e876bae0370ee69c4aa7dbcdb0b3

    • SHA256

      620c39cbecebe9f1efdc516a73c0446ed22d7f3111b530ef14c19860e275c5ba

    • SHA512

      988d1d42e9abf1797816044c65f746b57bc178b1f0af7574f7fb21dd4238d1cd51356fcab9a42e7910129dcd75a6133b0aa888487b274cb31f46de7d711542b4

    • SSDEEP

      3072:GHGiRUuWQbEr4l+A+dsvYuAVRLvbYQCECc0W8pFJVtIBeN9Db8L:GmivWQ/lkM7ihvYy0W8PJV6Bsu

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks