General

  • Target

    e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118

  • Size

    165KB

  • Sample

    241212-2e6mtszkbs

  • MD5

    e892ab03ade3ed2e60ac6a42ebff863d

  • SHA1

    9222c2a015a96c35e58a781b27e5a01c9ec9c4c8

  • SHA256

    99a87e97639663f4fbc9d92aa505a16410b3eff11c594658c6716907a283f21a

  • SHA512

    43ef37865529b039134583744f032b92f2e17652c900032fe35fb460edffa00c69273c2518173509830fe5f9bc60c1048d2fa9660839986fb237b201c79d7eb6

  • SSDEEP

    3072:mdIhB/iDjld0dsvDnuxluIIkWj/eoOtqysPiIFov2eKACXqoRr0CQ/33DTB/S:mdi6fld0dGUTPWKqycNq2esXqSr0rF

Malware Config

Targets

    • Target

      e892ab03ade3ed2e60ac6a42ebff863d_JaffaCakes118

    • Size

      165KB

    • MD5

      e892ab03ade3ed2e60ac6a42ebff863d

    • SHA1

      9222c2a015a96c35e58a781b27e5a01c9ec9c4c8

    • SHA256

      99a87e97639663f4fbc9d92aa505a16410b3eff11c594658c6716907a283f21a

    • SHA512

      43ef37865529b039134583744f032b92f2e17652c900032fe35fb460edffa00c69273c2518173509830fe5f9bc60c1048d2fa9660839986fb237b201c79d7eb6

    • SSDEEP

      3072:mdIhB/iDjld0dsvDnuxluIIkWj/eoOtqysPiIFov2eKACXqoRr0CQ/33DTB/S:mdi6fld0dGUTPWKqycNq2esXqSr0rF

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks