General

  • Target

    f39faafbb1da36fab9a5682550d36926_JaffaCakes118

  • Size

    646KB

  • Sample

    241215-mrd11stlan

  • MD5

    f39faafbb1da36fab9a5682550d36926

  • SHA1

    6cca16af9aa9ffb6ffac8eb0df35b21847f8da6a

  • SHA256

    4e307ed1132b7102cefd17dee8f29d5329d84f932001af35214515de7942b4f3

  • SHA512

    232beab7ec854651ee56510f4e7dc954bbd4343dc6d7865a0aed04472e91d1281c293ab83a903b52e22db89d8bf01fc69e95cc06636cc4a231cc4e04e6d73000

  • SSDEEP

    12288:k/dr9yql7Xi+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNSyUdMONUzeosyu4M

Malware Config

Targets

    • Target

      f39faafbb1da36fab9a5682550d36926_JaffaCakes118

    • Size

      646KB

    • MD5

      f39faafbb1da36fab9a5682550d36926

    • SHA1

      6cca16af9aa9ffb6ffac8eb0df35b21847f8da6a

    • SHA256

      4e307ed1132b7102cefd17dee8f29d5329d84f932001af35214515de7942b4f3

    • SHA512

      232beab7ec854651ee56510f4e7dc954bbd4343dc6d7865a0aed04472e91d1281c293ab83a903b52e22db89d8bf01fc69e95cc06636cc4a231cc4e04e6d73000

    • SSDEEP

      12288:k/dr9yql7Xi+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNSyUdMONUzeosyu4M

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Modifies visiblity of hidden/system files in Explorer

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks