General

  • Target

    e4078f024216d42ffb2cf93253d1e269_JaffaCakes118

  • Size

    202KB

  • Sample

    241212-bkmtsszkel

  • MD5

    e4078f024216d42ffb2cf93253d1e269

  • SHA1

    388d33df212372db1baefe5dcd8a2952fbe2bfd5

  • SHA256

    4011693ae2f420ea3775f4382304d5938a44cb3400bee4ee964decf2177d9755

  • SHA512

    5e0b5ac29d8d6535cc355d24ca9ff30779e5d59321a02f180b62770e15429333e9296e90fd1184bede465b39b044c3d180dc34bbd899407d6557a5a828ab9a42

  • SSDEEP

    3072:VbOCtDy04LH1tMYBhsYWc/iCah6R29Tjo4vEywZSQr6hlR9Zl2VMjdMYt8ssD3:pOUT4JngYWbCap9TjoohS3ejdPt8ss

Malware Config

Targets

    • Target

      e4078f024216d42ffb2cf93253d1e269_JaffaCakes118

    • Size

      202KB

    • MD5

      e4078f024216d42ffb2cf93253d1e269

    • SHA1

      388d33df212372db1baefe5dcd8a2952fbe2bfd5

    • SHA256

      4011693ae2f420ea3775f4382304d5938a44cb3400bee4ee964decf2177d9755

    • SHA512

      5e0b5ac29d8d6535cc355d24ca9ff30779e5d59321a02f180b62770e15429333e9296e90fd1184bede465b39b044c3d180dc34bbd899407d6557a5a828ab9a42

    • SSDEEP

      3072:VbOCtDy04LH1tMYBhsYWc/iCah6R29Tjo4vEywZSQr6hlR9Zl2VMjdMYt8ssD3:pOUT4JngYWbCap9TjoohS3ejdPt8ss

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks