General

  • Target

    e39f84c4738f5e8a1cdf4cbe25e55289_JaffaCakes118

  • Size

    225KB

  • Sample

    241211-23z5yswnbm

  • MD5

    e39f84c4738f5e8a1cdf4cbe25e55289

  • SHA1

    a0d07204a406452f664b9894a55c963af03dbbf2

  • SHA256

    ca6661df5965e0412f57c2609b258dbfa3d6070b13742bbee23f0da3e96c1f08

  • SHA512

    ff706c840ba0e72e283f6a460ab74191d83b807e0390dbcdd452e77fd2dea5056eede2459f39fa7839d00aa3b90e70b1bc0df83001af441bcc16c7796d31aaa5

  • SSDEEP

    6144:9eujFBvOJcyDM2FkANE3QE0huQUnggHTQ4mhmCLv3/G4+6:9eujvOJcylFkANE3QnY5gC846mCLv/O

Malware Config

Targets

    • Target

      e39f84c4738f5e8a1cdf4cbe25e55289_JaffaCakes118

    • Size

      225KB

    • MD5

      e39f84c4738f5e8a1cdf4cbe25e55289

    • SHA1

      a0d07204a406452f664b9894a55c963af03dbbf2

    • SHA256

      ca6661df5965e0412f57c2609b258dbfa3d6070b13742bbee23f0da3e96c1f08

    • SHA512

      ff706c840ba0e72e283f6a460ab74191d83b807e0390dbcdd452e77fd2dea5056eede2459f39fa7839d00aa3b90e70b1bc0df83001af441bcc16c7796d31aaa5

    • SSDEEP

      6144:9eujFBvOJcyDM2FkANE3QE0huQUnggHTQ4mhmCLv3/G4+6:9eujvOJcylFkANE3QnY5gC846mCLv/O

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks