General

  • Target

    e56bd279edd15266f11a5e3bb081e104_JaffaCakes118

  • Size

    164KB

  • Sample

    241212-jwn51axpgy

  • MD5

    e56bd279edd15266f11a5e3bb081e104

  • SHA1

    84b61f645ea8e3d7cae0218bab928364b76dcf13

  • SHA256

    d1f3de6e126cf7c820584a2e831c1173c94ca71683f4909fefa57da860c729ab

  • SHA512

    9b51ab6c78c4dc7560c4e41daa3ed3f95d8092b95af334d9f1904edc08b5622f194e2341e21feaa34ac319e646a8fb8d25e3a0f87068481c4e52d9271f80bdbf

  • SSDEEP

    3072:ENKOAQ+iq4PLId7Uqxo09anlkupJjcdMScUITd3h+YI:EgmzTINXdotJBScPxox

Malware Config

Targets

    • Target

      e56bd279edd15266f11a5e3bb081e104_JaffaCakes118

    • Size

      164KB

    • MD5

      e56bd279edd15266f11a5e3bb081e104

    • SHA1

      84b61f645ea8e3d7cae0218bab928364b76dcf13

    • SHA256

      d1f3de6e126cf7c820584a2e831c1173c94ca71683f4909fefa57da860c729ab

    • SHA512

      9b51ab6c78c4dc7560c4e41daa3ed3f95d8092b95af334d9f1904edc08b5622f194e2341e21feaa34ac319e646a8fb8d25e3a0f87068481c4e52d9271f80bdbf

    • SSDEEP

      3072:ENKOAQ+iq4PLId7Uqxo09anlkupJjcdMScUITd3h+YI:EgmzTINXdotJBScPxox

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks