General

  • Target

    e4e2d88e8c7740581f300995189d0393_JaffaCakes118

  • Size

    168KB

  • Sample

    241212-f3lrnsskby

  • MD5

    e4e2d88e8c7740581f300995189d0393

  • SHA1

    13a88b3a57190a10838aa92aae1b649443e9549b

  • SHA256

    7215ca9d1a38ffa31663e43d869958a9cda47e5b4f76b1ae8e010152e5da1924

  • SHA512

    ca838530a6ebe2e983bc09e1f8e66738306d2bf17124b99e8c23a660cb404d2072611350a4690caa33124d6d0a9665ad97f265d8e76357768eadbb918a8a62b9

  • SSDEEP

    3072:S5Wt/iXE2F7S0nmJqPTsEof4R88yz7FzxTiiisHs2fKnqIBYaFIDe3i:SUt/uPdqJqPYEc4WD7FzEbYaFIDeS

Malware Config

Targets

    • Target

      e4e2d88e8c7740581f300995189d0393_JaffaCakes118

    • Size

      168KB

    • MD5

      e4e2d88e8c7740581f300995189d0393

    • SHA1

      13a88b3a57190a10838aa92aae1b649443e9549b

    • SHA256

      7215ca9d1a38ffa31663e43d869958a9cda47e5b4f76b1ae8e010152e5da1924

    • SHA512

      ca838530a6ebe2e983bc09e1f8e66738306d2bf17124b99e8c23a660cb404d2072611350a4690caa33124d6d0a9665ad97f265d8e76357768eadbb918a8a62b9

    • SSDEEP

      3072:S5Wt/iXE2F7S0nmJqPTsEof4R88yz7FzxTiiisHs2fKnqIBYaFIDe3i:SUt/uPdqJqPYEc4WD7FzEbYaFIDeS

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks