General

  • Target

    e50766c294f43e3d17f597db6d6ea0e0_JaffaCakes118

  • Size

    177KB

  • Sample

    241212-gr3fqaxkdn

  • MD5

    e50766c294f43e3d17f597db6d6ea0e0

  • SHA1

    92f0417754bc88da5d4a9f341f14152f37219d54

  • SHA256

    b1e5c7732d71ae8440eb719c4a1e5de60da6a367f35f4b7cd629b2b9e85c03e6

  • SHA512

    57e184eca11d7eec3b9e48a1f9c66efa1d20c980a24ed100ef70e044c2d34a37c8bd73064300b89da50fb527affc03f1346ef8792856c19e35f487c618d18ce0

  • SSDEEP

    3072:auPaKqI+QD3jtWowyQUDSInoh0Spdz2d2pxw/VVjiSBWB3QR2dosDS0:auPaLI+QrjQoYUD1nOzzYWBcKx

Malware Config

Targets

    • Target

      e50766c294f43e3d17f597db6d6ea0e0_JaffaCakes118

    • Size

      177KB

    • MD5

      e50766c294f43e3d17f597db6d6ea0e0

    • SHA1

      92f0417754bc88da5d4a9f341f14152f37219d54

    • SHA256

      b1e5c7732d71ae8440eb719c4a1e5de60da6a367f35f4b7cd629b2b9e85c03e6

    • SHA512

      57e184eca11d7eec3b9e48a1f9c66efa1d20c980a24ed100ef70e044c2d34a37c8bd73064300b89da50fb527affc03f1346ef8792856c19e35f487c618d18ce0

    • SSDEEP

      3072:auPaKqI+QD3jtWowyQUDSInoh0Spdz2d2pxw/VVjiSBWB3QR2dosDS0:auPaLI+QrjQoYUD1nOzzYWBcKx

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks