General

  • Target

    e53d5f6a8efc6e31d4f56b9d8841275f_JaffaCakes118

  • Size

    165KB

  • Sample

    241212-hvzdxatpcz

  • MD5

    e53d5f6a8efc6e31d4f56b9d8841275f

  • SHA1

    4cfe2dbd02182c160199ec84e5d6555102b8f246

  • SHA256

    37f3cdb5d0221a875a5f151e6f01c273b3e225d8886cad481c1d054a9680b924

  • SHA512

    db951769e3e135cc3b2aa661dd6cbe693ddffb691faa3fc63826782a79d5fcd4eb7a505260e26231205f03d90e3d6941c039fb34d6d9fdca89c66d920127a9b4

  • SSDEEP

    3072:tXRVUWm/NO0z6Qm35ed/hc9rzuhGbpObz4BnKyD16VC5ina6DhXd6G2:tXvANWP8GwXiX6V

Malware Config

Targets

    • Target

      e53d5f6a8efc6e31d4f56b9d8841275f_JaffaCakes118

    • Size

      165KB

    • MD5

      e53d5f6a8efc6e31d4f56b9d8841275f

    • SHA1

      4cfe2dbd02182c160199ec84e5d6555102b8f246

    • SHA256

      37f3cdb5d0221a875a5f151e6f01c273b3e225d8886cad481c1d054a9680b924

    • SHA512

      db951769e3e135cc3b2aa661dd6cbe693ddffb691faa3fc63826782a79d5fcd4eb7a505260e26231205f03d90e3d6941c039fb34d6d9fdca89c66d920127a9b4

    • SSDEEP

      3072:tXRVUWm/NO0z6Qm35ed/hc9rzuhGbpObz4BnKyD16VC5ina6DhXd6G2:tXvANWP8GwXiX6V

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks