General

  • Target

    f202d2e4278ac5144051f219f703d66d_JaffaCakes118

  • Size

    181KB

  • Sample

    241215-dn1k6stqdl

  • MD5

    f202d2e4278ac5144051f219f703d66d

  • SHA1

    53a3869d925f9e98eb9afc0962791a67fdce1596

  • SHA256

    d672f3e4263ec8b715641a76958407a73bb15401e8f93b7d41372b8946b12b8c

  • SHA512

    b2c16312bab6204115fa38491670469516b39e0ddeec004da4cb2ca24f4231739d2bc7848fdfd055af40893a65481db2009c6196287a47d71170765333ceae11

  • SSDEEP

    3072:DIAIbOci8DKZH1oWMVBSYs3nO04OymqBQqk6C+RT+ciJnwPAaZZaOpc1CKNFZ:DIAIbji5VoRXSH3nAQqjRTmsXZZaNCuZ

Malware Config

Targets

    • Target

      f202d2e4278ac5144051f219f703d66d_JaffaCakes118

    • Size

      181KB

    • MD5

      f202d2e4278ac5144051f219f703d66d

    • SHA1

      53a3869d925f9e98eb9afc0962791a67fdce1596

    • SHA256

      d672f3e4263ec8b715641a76958407a73bb15401e8f93b7d41372b8946b12b8c

    • SHA512

      b2c16312bab6204115fa38491670469516b39e0ddeec004da4cb2ca24f4231739d2bc7848fdfd055af40893a65481db2009c6196287a47d71170765333ceae11

    • SSDEEP

      3072:DIAIbOci8DKZH1oWMVBSYs3nO04OymqBQqk6C+RT+ciJnwPAaZZaOpc1CKNFZ:DIAIbji5VoRXSH3nAQqjRTmsXZZaNCuZ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks