General

  • Target

    02453b088c4789a664a7c5deea78e455d8d8681c266d58a569120d70cf7b9e55

  • Size

    194KB

  • Sample

    241216-xsr95syndp

  • MD5

    f63d833c10db768188e7d27c6440f021

  • SHA1

    3dd44f62b6851518eb44008810f31f41efd715f6

  • SHA256

    02453b088c4789a664a7c5deea78e455d8d8681c266d58a569120d70cf7b9e55

  • SHA512

    e1d72af631620fd583146df64fce5b0df0bd8dbc39a498a29c669e210a902dd5cc5f47454142609845ef595dff5adeba85aff7b1d59fd3c3929e1ca9961fe585

  • SSDEEP

    3072:5aIAIURcG02hGZ3yMAx4AvS/1JjU+hGGhVTOEPttEvuMu8asuiUh/b49neFiFaoB:5mTRx0z3yMQDS/XjzYi/lkBN7JCDZ4t

Malware Config

Targets

    • Target

      02453b088c4789a664a7c5deea78e455d8d8681c266d58a569120d70cf7b9e55

    • Size

      194KB

    • MD5

      f63d833c10db768188e7d27c6440f021

    • SHA1

      3dd44f62b6851518eb44008810f31f41efd715f6

    • SHA256

      02453b088c4789a664a7c5deea78e455d8d8681c266d58a569120d70cf7b9e55

    • SHA512

      e1d72af631620fd583146df64fce5b0df0bd8dbc39a498a29c669e210a902dd5cc5f47454142609845ef595dff5adeba85aff7b1d59fd3c3929e1ca9961fe585

    • SSDEEP

      3072:5aIAIURcG02hGZ3yMAx4AvS/1JjU+hGGhVTOEPttEvuMu8asuiUh/b49neFiFaoB:5mTRx0z3yMQDS/XjzYi/lkBN7JCDZ4t

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks