General

  • Target

    ec7dbb683dab64773c2e078349c8b42d_JaffaCakes118

  • Size

    176KB

  • Sample

    241213-vg2y4awqck

  • MD5

    ec7dbb683dab64773c2e078349c8b42d

  • SHA1

    57bfca8c885d5af870ad77fddf8c1d2825bb3f9f

  • SHA256

    9d06c234179fbc06b11c66d5e5de79630ac1f6fa045a93394f11e80353d51150

  • SHA512

    f9030fb149437ba3ddfe9c2c7b7c880523f381ffaa8a3c4d25bc28ea78b2701ce66a4141c1904b1e29d5e559539d3120413e296b52b2dbd2d515cc69e5e0f72b

  • SSDEEP

    3072:TuAPwqxrVzjpz1in36COUxRKqovt7ecDU9FUxtKmRl7nb4luO2I:p7ztzQD5AFdDUIxR64O2

Malware Config

Targets

    • Target

      ec7dbb683dab64773c2e078349c8b42d_JaffaCakes118

    • Size

      176KB

    • MD5

      ec7dbb683dab64773c2e078349c8b42d

    • SHA1

      57bfca8c885d5af870ad77fddf8c1d2825bb3f9f

    • SHA256

      9d06c234179fbc06b11c66d5e5de79630ac1f6fa045a93394f11e80353d51150

    • SHA512

      f9030fb149437ba3ddfe9c2c7b7c880523f381ffaa8a3c4d25bc28ea78b2701ce66a4141c1904b1e29d5e559539d3120413e296b52b2dbd2d515cc69e5e0f72b

    • SSDEEP

      3072:TuAPwqxrVzjpz1in36COUxRKqovt7ecDU9FUxtKmRl7nb4luO2I:p7ztzQD5AFdDUIxR64O2

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks