General

  • Target

    e7cf74bc195962039c4e9985c09e19ae_JaffaCakes118

  • Size

    157KB

  • Sample

    241212-xmt7jstnas

  • MD5

    e7cf74bc195962039c4e9985c09e19ae

  • SHA1

    3493ddd8758710f13da7e381a2ca07650d143c7d

  • SHA256

    b1e02a41598f99626f71545601f5b8768dec7194af5014cfc08c3df815612833

  • SHA512

    c7cd868eb9293313017fce4b60035feccf7e5e5b8a72e618e1d3a49a2ee661c076661a581c8a165706fd49f2ad266a255590235b775ce140028ca6ac409b81c8

  • SSDEEP

    3072:e2Y22r5Ml9X8dvEW2w5t3nKJsprZhuo01EDWHZ54TdS7/l7SS7StqXNdmz/:MVril9X8dvt2C3Br01lHb4RSLpreKM/

Malware Config

Targets

    • Target

      e7cf74bc195962039c4e9985c09e19ae_JaffaCakes118

    • Size

      157KB

    • MD5

      e7cf74bc195962039c4e9985c09e19ae

    • SHA1

      3493ddd8758710f13da7e381a2ca07650d143c7d

    • SHA256

      b1e02a41598f99626f71545601f5b8768dec7194af5014cfc08c3df815612833

    • SHA512

      c7cd868eb9293313017fce4b60035feccf7e5e5b8a72e618e1d3a49a2ee661c076661a581c8a165706fd49f2ad266a255590235b775ce140028ca6ac409b81c8

    • SSDEEP

      3072:e2Y22r5Ml9X8dvEW2w5t3nKJsprZhuo01EDWHZ54TdS7/l7SS7StqXNdmz/:MVril9X8dvt2C3Br01lHb4RSLpreKM/

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks