General

  • Target

    e4129dd49a25fed941390c3c868a00b6_JaffaCakes118

  • Size

    189KB

  • Sample

    241212-bszhkazmhp

  • MD5

    e4129dd49a25fed941390c3c868a00b6

  • SHA1

    fef286ad794c1030b0d13c35352f955a9675e3e7

  • SHA256

    b97ce8b785b7796c78e436357781c54c139750744a2e48221c5e11291df644dd

  • SHA512

    68c692c3a2fea5130c43f4fbdaf36f18f67719b44f2ac558c8ed32fec80e010ce3dac3848c62054907671d356707e155d33d2e2fd5a7497d1e0c65e224f873d3

  • SSDEEP

    3072:XhYBm4OJInA3dDresjpTliQEZoSbzj4za1uJTNUGe18XtkOxgxxNWTrCIIgm:XhOm4AInA3dXeSVUQEZ/bzolzVVO8q

Malware Config

Targets

    • Target

      e4129dd49a25fed941390c3c868a00b6_JaffaCakes118

    • Size

      189KB

    • MD5

      e4129dd49a25fed941390c3c868a00b6

    • SHA1

      fef286ad794c1030b0d13c35352f955a9675e3e7

    • SHA256

      b97ce8b785b7796c78e436357781c54c139750744a2e48221c5e11291df644dd

    • SHA512

      68c692c3a2fea5130c43f4fbdaf36f18f67719b44f2ac558c8ed32fec80e010ce3dac3848c62054907671d356707e155d33d2e2fd5a7497d1e0c65e224f873d3

    • SSDEEP

      3072:XhYBm4OJInA3dDresjpTliQEZoSbzj4za1uJTNUGe18XtkOxgxxNWTrCIIgm:XhOm4AInA3dXeSVUQEZ/bzolzVVO8q

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks