General

  • Target

    e4dc0f72cc5862a204738cb9c6429288_JaffaCakes118

  • Size

    166KB

  • Sample

    241212-fxmf1swmfn

  • MD5

    e4dc0f72cc5862a204738cb9c6429288

  • SHA1

    1b1d5df55f676171259b57e8c334803143c3a08c

  • SHA256

    cd55b78b513ceac946fc91ca72dc6c5d0f0c05a5c80d0d0d0ffe006062f86da7

  • SHA512

    eef58327b97248baea2e04f28173f93be400af2e1e4173f468cb641106fe5046636ce593d42ad8c882b330cfd04401a80c5bdde13bf218df3f00c15ccd4e386e

  • SSDEEP

    3072:1xAKwmQwtNH6n9jB5wkpPFzlC90/W7IlTk/1SRm4TKHXe6aluzzdXo9:1O6V6n9jLtFU/OASRvT6OafdXo9

Malware Config

Targets

    • Target

      e4dc0f72cc5862a204738cb9c6429288_JaffaCakes118

    • Size

      166KB

    • MD5

      e4dc0f72cc5862a204738cb9c6429288

    • SHA1

      1b1d5df55f676171259b57e8c334803143c3a08c

    • SHA256

      cd55b78b513ceac946fc91ca72dc6c5d0f0c05a5c80d0d0d0ffe006062f86da7

    • SHA512

      eef58327b97248baea2e04f28173f93be400af2e1e4173f468cb641106fe5046636ce593d42ad8c882b330cfd04401a80c5bdde13bf218df3f00c15ccd4e386e

    • SSDEEP

      3072:1xAKwmQwtNH6n9jB5wkpPFzlC90/W7IlTk/1SRm4TKHXe6aluzzdXo9:1O6V6n9jLtFU/OASRvT6OafdXo9

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks