General

  • Target

    fbc9869c4dfc9ba6420202e949e20ea3_JaffaCakes118

  • Size

    181KB

  • Sample

    241218-q4nmrs1lew

  • MD5

    fbc9869c4dfc9ba6420202e949e20ea3

  • SHA1

    b8bd21f6d020efcc73dd1a030a85bcbe99e577a9

  • SHA256

    b4b6fdc095a7d4a5ef3ed7e9dbc5761bbb41153d0ec67921d2e595aa5e50f514

  • SHA512

    ad6d305cea5980127850244d2329d72c6b8f70931f96da4a8fb82ba161559ea3c8270888d07a7f7ff80734f21659f6d82491c809c890b70f9b09acafc8d839c5

  • SSDEEP

    3072:Gxl1HO4NAPPrQv93zKRKtgI0H97iBAdjUYy6N7GaUnzyI5dTjfREoOuQHOOZzo:GbdO4ePPa3zdkH9kAd5N7GhnHtjfREo8

Malware Config

Targets

    • Target

      fbc9869c4dfc9ba6420202e949e20ea3_JaffaCakes118

    • Size

      181KB

    • MD5

      fbc9869c4dfc9ba6420202e949e20ea3

    • SHA1

      b8bd21f6d020efcc73dd1a030a85bcbe99e577a9

    • SHA256

      b4b6fdc095a7d4a5ef3ed7e9dbc5761bbb41153d0ec67921d2e595aa5e50f514

    • SHA512

      ad6d305cea5980127850244d2329d72c6b8f70931f96da4a8fb82ba161559ea3c8270888d07a7f7ff80734f21659f6d82491c809c890b70f9b09acafc8d839c5

    • SSDEEP

      3072:Gxl1HO4NAPPrQv93zKRKtgI0H97iBAdjUYy6N7GaUnzyI5dTjfREoOuQHOOZzo:GbdO4ePPa3zdkH9kAd5N7GhnHtjfREo8

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks