General

  • Target

    ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118

  • Size

    169KB

  • Sample

    241214-lwvnwsyjby

  • MD5

    ee314beed37dd444c4a6b1c5f6de4487

  • SHA1

    17787582760b4522cc92ac218df3c3774a5b38cc

  • SHA256

    192b3c07d7331b338bc400ca0b8c12dfea74fed83363992a801e6d0e1654884a

  • SHA512

    3d6ae0cf2ba47e9d7b40a5ebc2df1f0394094ce1906875365978e16f885fbb1a18e6ad018b380b08bc47636677a8b311f74ebf1f50aa87cf662862bb5038d64a

  • SSDEEP

    3072:ZYGy9/koA4KzZRZtDb6n7MckPJHgqH9OZxG8YT1jKbvwuCXhgbGtV4tNIHlol49b:WGyNkhfHDEGxgrxpYTNLGtNIul49qSMQ

Malware Config

Targets

    • Target

      ee314beed37dd444c4a6b1c5f6de4487_JaffaCakes118

    • Size

      169KB

    • MD5

      ee314beed37dd444c4a6b1c5f6de4487

    • SHA1

      17787582760b4522cc92ac218df3c3774a5b38cc

    • SHA256

      192b3c07d7331b338bc400ca0b8c12dfea74fed83363992a801e6d0e1654884a

    • SHA512

      3d6ae0cf2ba47e9d7b40a5ebc2df1f0394094ce1906875365978e16f885fbb1a18e6ad018b380b08bc47636677a8b311f74ebf1f50aa87cf662862bb5038d64a

    • SSDEEP

      3072:ZYGy9/koA4KzZRZtDb6n7MckPJHgqH9OZxG8YT1jKbvwuCXhgbGtV4tNIHlol49b:WGyNkhfHDEGxgrxpYTNLGtNIul49qSMQ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks