General

  • Target

    f9de8d71580b053a83777c28dd26142f_JaffaCakes118

  • Size

    172KB

  • Sample

    241218-dp3f6azqcz

  • MD5

    f9de8d71580b053a83777c28dd26142f

  • SHA1

    a34ea9cac98bd9faf74b07a06cd2583eddd20cdc

  • SHA256

    be548ab1807ed68394949e77d02f90f16e1e04caa6a59b6b16cb728fb2c420ec

  • SHA512

    a9c84b315cfcb4fca1d94115b0545ec8918a6e0e70189051e420da4ba58786d55674b514127925c51850e2d69c0b006a808b9f917c8f4d6ddbe53cbe565938ab

  • SSDEEP

    3072:VCF6f1P8S92LGWuko2kr+1GA20i2tU/z6qJP2Pqb6ot5PLLtK9jpduIvR:VCF6+tCJkop+0A/kBPiq5t5PLRK97bR

Malware Config

Targets

    • Target

      f9de8d71580b053a83777c28dd26142f_JaffaCakes118

    • Size

      172KB

    • MD5

      f9de8d71580b053a83777c28dd26142f

    • SHA1

      a34ea9cac98bd9faf74b07a06cd2583eddd20cdc

    • SHA256

      be548ab1807ed68394949e77d02f90f16e1e04caa6a59b6b16cb728fb2c420ec

    • SHA512

      a9c84b315cfcb4fca1d94115b0545ec8918a6e0e70189051e420da4ba58786d55674b514127925c51850e2d69c0b006a808b9f917c8f4d6ddbe53cbe565938ab

    • SSDEEP

      3072:VCF6f1P8S92LGWuko2kr+1GA20i2tU/z6qJP2Pqb6ot5PLLtK9jpduIvR:VCF6+tCJkop+0A/kBPiq5t5PLRK97bR

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks