General

  • Target

    e78d9e0f45c173e095f7ec19217b43c0_JaffaCakes118

  • Size

    188KB

  • Sample

    241212-wdnsqstnem

  • MD5

    e78d9e0f45c173e095f7ec19217b43c0

  • SHA1

    b6245898afa7279abb1752d4d45630052b5e1d76

  • SHA256

    d31bfbce88b6b689577b88ca13849d722aa675083b87119268bdee3d83ab465e

  • SHA512

    c2817608ad4e1c906d40a79c4afee35b000ea4283d7e3ac863c27ef22e05467688f14b3f23013a45d6790f5157a6fa2834b149f835b28563722a76ae11e0fd27

  • SSDEEP

    3072:vU6YwDTF1jEwy3aWxk/jIZ6S8CgN7+Mm6N8pN31GLKiDS+QxcLr7TdAo:vUcXFFEzCUp8CgAMmU8D1GLhbQM7T

Malware Config

Targets

    • Target

      e78d9e0f45c173e095f7ec19217b43c0_JaffaCakes118

    • Size

      188KB

    • MD5

      e78d9e0f45c173e095f7ec19217b43c0

    • SHA1

      b6245898afa7279abb1752d4d45630052b5e1d76

    • SHA256

      d31bfbce88b6b689577b88ca13849d722aa675083b87119268bdee3d83ab465e

    • SHA512

      c2817608ad4e1c906d40a79c4afee35b000ea4283d7e3ac863c27ef22e05467688f14b3f23013a45d6790f5157a6fa2834b149f835b28563722a76ae11e0fd27

    • SSDEEP

      3072:vU6YwDTF1jEwy3aWxk/jIZ6S8CgN7+Mm6N8pN31GLKiDS+QxcLr7TdAo:vUcXFFEzCUp8CgAMmU8D1GLhbQM7T

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks