General

  • Target

    e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118

  • Size

    202KB

  • Sample

    241212-e514ps1kds

  • MD5

    e4b45a43e41484cff1f00bb8534500bd

  • SHA1

    a83d58b6b21b568b1ca766508015c82705d1a496

  • SHA256

    3a25ace61427f636b1ae70700031cb484af84555f7b93d11a7cbb102586a2f0c

  • SHA512

    7a4d56695ebe04e5618b14b31dd9f4befaeabc885dbb940385abc79ab1d4e321c66a0fc5c9ffe590a168618c6261035342fd5f948f8026a70479d18f79794d03

  • SSDEEP

    6144:qdaWg52l/KfoGZuyrIhg4/a4BUiqu/If:qEWgkykVajm/If

Malware Config

Targets

    • Target

      e4b45a43e41484cff1f00bb8534500bd_JaffaCakes118

    • Size

      202KB

    • MD5

      e4b45a43e41484cff1f00bb8534500bd

    • SHA1

      a83d58b6b21b568b1ca766508015c82705d1a496

    • SHA256

      3a25ace61427f636b1ae70700031cb484af84555f7b93d11a7cbb102586a2f0c

    • SHA512

      7a4d56695ebe04e5618b14b31dd9f4befaeabc885dbb940385abc79ab1d4e321c66a0fc5c9ffe590a168618c6261035342fd5f948f8026a70479d18f79794d03

    • SSDEEP

      6144:qdaWg52l/KfoGZuyrIhg4/a4BUiqu/If:qEWgkykVajm/If

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks