General

  • Target

    efe5a4dc47a3973279f70e844233de67_JaffaCakes118

  • Size

    169KB

  • Sample

    241214-v2ts8a1khp

  • MD5

    efe5a4dc47a3973279f70e844233de67

  • SHA1

    14deca72174952578ceabb767f58f5ac6dadb638

  • SHA256

    6c1756aa530b36cac92d6ddcd49b9bc2b4b3b72ee86db90963a426c13257fae1

  • SHA512

    f0bd44b4bf10f714b49dc6d8ed675268b3f8ec135b87abfc0887b4bda444d32fea9635c8b9b3a656edf9a304922be82543ec5de2e9e0313e0c5a0f7dca1f0b51

  • SSDEEP

    3072:3YGy9/koA4KzeRZtDb6n7MckPJHgqH9OZxG8YT1jKbvwuCXhgbGtV4tNIHlol49b:oGyNkh8HDEGxgrxpYTNLGtNIul49qSMQ

Malware Config

Targets

    • Target

      efe5a4dc47a3973279f70e844233de67_JaffaCakes118

    • Size

      169KB

    • MD5

      efe5a4dc47a3973279f70e844233de67

    • SHA1

      14deca72174952578ceabb767f58f5ac6dadb638

    • SHA256

      6c1756aa530b36cac92d6ddcd49b9bc2b4b3b72ee86db90963a426c13257fae1

    • SHA512

      f0bd44b4bf10f714b49dc6d8ed675268b3f8ec135b87abfc0887b4bda444d32fea9635c8b9b3a656edf9a304922be82543ec5de2e9e0313e0c5a0f7dca1f0b51

    • SSDEEP

      3072:3YGy9/koA4KzeRZtDb6n7MckPJHgqH9OZxG8YT1jKbvwuCXhgbGtV4tNIHlol49b:oGyNkh8HDEGxgrxpYTNLGtNIul49qSMQ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks