General

  • Target

    faa9d3d4b2cf3fda2c0ba3b78dc371a4_JaffaCakes118

  • Size

    172KB

  • Sample

    241218-jhxj8a1mbk

  • MD5

    faa9d3d4b2cf3fda2c0ba3b78dc371a4

  • SHA1

    0a854fb3fb246de875a71487347bdd164809495c

  • SHA256

    b6ad7b879c06ff01514f01abd93ea518d8fc76d604c34ea445e197b2bd9f2aea

  • SHA512

    16b164cf5139dfe6500b9828b5ad2c9c1cac9966ff8a42004b58a4e5f0889bf4e1407678ef6acc528bf4953f17a30f51c297bfd60f3f737c0e8c7c727b812ff0

  • SSDEEP

    3072:zck7CKzGS00Kede+/nBeTHheh9xeYh6rf8YWOnZhqEqnGxLUuk08nqLAmeL5:zck7CKj5yiBeT0hL+WbfnqJ

Malware Config

Targets

    • Target

      faa9d3d4b2cf3fda2c0ba3b78dc371a4_JaffaCakes118

    • Size

      172KB

    • MD5

      faa9d3d4b2cf3fda2c0ba3b78dc371a4

    • SHA1

      0a854fb3fb246de875a71487347bdd164809495c

    • SHA256

      b6ad7b879c06ff01514f01abd93ea518d8fc76d604c34ea445e197b2bd9f2aea

    • SHA512

      16b164cf5139dfe6500b9828b5ad2c9c1cac9966ff8a42004b58a4e5f0889bf4e1407678ef6acc528bf4953f17a30f51c297bfd60f3f737c0e8c7c727b812ff0

    • SSDEEP

      3072:zck7CKzGS00Kede+/nBeTHheh9xeYh6rf8YWOnZhqEqnGxLUuk08nqLAmeL5:zck7CKj5yiBeT0hL+WbfnqJ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks