General

  • Target

    ed25e914c5b580a9c329937c1f6d6a02_JaffaCakes118

  • Size

    156KB

  • Sample

    241213-25csfasngq

  • MD5

    ed25e914c5b580a9c329937c1f6d6a02

  • SHA1

    f79fdca9d633b6a31ff293d4437ff60eefd829bc

  • SHA256

    b05c0cf8333e8a12a3d06a3f0331d2b5987c01e366d757222cf271d7869ead3d

  • SHA512

    8ab74dc5edae21eadee8304949556df608a198730c3499a13b063caa775fc91911971f04a3b22c8e7f78ab53b5062a140438b09c9af6bc4ba6caf9cc2a1d8d40

  • SSDEEP

    3072:Gok8yWxodS+JpVjFlWtL+KbzOwLBg35WMqSTOxat5894V3uZ85JNTio3bxAtmEby:Gokk+dS+9jFZkqj3wMH5JBv2oLxAtmEW

Malware Config

Targets

    • Target

      ed25e914c5b580a9c329937c1f6d6a02_JaffaCakes118

    • Size

      156KB

    • MD5

      ed25e914c5b580a9c329937c1f6d6a02

    • SHA1

      f79fdca9d633b6a31ff293d4437ff60eefd829bc

    • SHA256

      b05c0cf8333e8a12a3d06a3f0331d2b5987c01e366d757222cf271d7869ead3d

    • SHA512

      8ab74dc5edae21eadee8304949556df608a198730c3499a13b063caa775fc91911971f04a3b22c8e7f78ab53b5062a140438b09c9af6bc4ba6caf9cc2a1d8d40

    • SSDEEP

      3072:Gok8yWxodS+JpVjFlWtL+KbzOwLBg35WMqSTOxat5894V3uZ85JNTio3bxAtmEby:Gokk+dS+9jFZkqj3wMH5JBv2oLxAtmEW

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks