General

  • Target

    e8a6928cc95b1eebf6161c49c9e2e176_JaffaCakes118

  • Size

    502KB

  • Sample

    241212-2sclxazmgv

  • MD5

    e8a6928cc95b1eebf6161c49c9e2e176

  • SHA1

    800adb67aee6bf97f90acbb9b87650a2f71c7750

  • SHA256

    11ad426afa608c63ca0dee8066da34b50a6e144b308310f85466e175124b2ba1

  • SHA512

    2d774dcc29223ebe566d8cac5d5c153699baced7825c3e9dbf5f1716ec0cc832d9935bad79b70de45c5ecf79e49327556b40c4983952edb2cee89e631885d51e

  • SSDEEP

    12288:cY6K+nHlocnuZdKDADRz/I+qktYfbO5PecAEVy:cY67FTAZ/I+1SIPC1

Malware Config

Targets

    • Target

      e8a6928cc95b1eebf6161c49c9e2e176_JaffaCakes118

    • Size

      502KB

    • MD5

      e8a6928cc95b1eebf6161c49c9e2e176

    • SHA1

      800adb67aee6bf97f90acbb9b87650a2f71c7750

    • SHA256

      11ad426afa608c63ca0dee8066da34b50a6e144b308310f85466e175124b2ba1

    • SHA512

      2d774dcc29223ebe566d8cac5d5c153699baced7825c3e9dbf5f1716ec0cc832d9935bad79b70de45c5ecf79e49327556b40c4983952edb2cee89e631885d51e

    • SSDEEP

      12288:cY6K+nHlocnuZdKDADRz/I+qktYfbO5PecAEVy:cY67FTAZ/I+1SIPC1

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks