General

  • Target

    f7269db071401b7ae77a9ad435e7d7c1_JaffaCakes118

  • Size

    185KB

  • Sample

    241216-eb9trasnd1

  • MD5

    f7269db071401b7ae77a9ad435e7d7c1

  • SHA1

    5a40a6c631044d1baff47d5033bd75dfb2d25567

  • SHA256

    0e45e1853c0bc76bc96fcd66244e3b3a08647002878ede3b0de16178f1de03e7

  • SHA512

    2fa905023eb7b98914ca7f1c0614af9433ad2405b11db01a843fbaad8927e9cefe9305ed73a45421bfc4dbf141cf9cf6a8e945fbee89d175062d5ba353111221

  • SSDEEP

    3072:KO9NrNPYqjpXjOJ+rxgi0UNa4X0BvTZSc9NKRWjR7TEaafoGvD+YIgz2w1W/dda:NLPYqNXSJSWi0UNa4EBboc9NIYEoGvDB

Malware Config

Targets

    • Target

      f7269db071401b7ae77a9ad435e7d7c1_JaffaCakes118

    • Size

      185KB

    • MD5

      f7269db071401b7ae77a9ad435e7d7c1

    • SHA1

      5a40a6c631044d1baff47d5033bd75dfb2d25567

    • SHA256

      0e45e1853c0bc76bc96fcd66244e3b3a08647002878ede3b0de16178f1de03e7

    • SHA512

      2fa905023eb7b98914ca7f1c0614af9433ad2405b11db01a843fbaad8927e9cefe9305ed73a45421bfc4dbf141cf9cf6a8e945fbee89d175062d5ba353111221

    • SSDEEP

      3072:KO9NrNPYqjpXjOJ+rxgi0UNa4X0BvTZSc9NKRWjR7TEaafoGvD+YIgz2w1W/dda:NLPYqNXSJSWi0UNa4EBboc9NIYEoGvDB

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks