General
-
Target
JaffaCakes118_60addbb48b547e182553d9f8aaaae18e
-
Size
840KB
-
Sample
250101-z133qawrfn
-
MD5
60addbb48b547e182553d9f8aaaae18e
-
SHA1
77844cba4deaae8b2af15c71899b1dd8ddc51edf
-
SHA256
6291e62fef34927bc7c8110bc2e079e728f21ba730b09be821983c1d4fbfde59
-
SHA512
fd9a70d8521a8f7464c981f3d0f3158485cc11de1e49e4fb4b5f59760524e9b9037d43d1e9b71813ccb8627b8128b0d43e5d6c5e8ca73b9863643241c91e4134
-
SSDEEP
12288:mCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:zk9P7nCvX6MNYLIbgYJ3chra+GbrL
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60addbb48b547e182553d9f8aaaae18e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_60addbb48b547e182553d9f8aaaae18e
-
Size
840KB
-
MD5
60addbb48b547e182553d9f8aaaae18e
-
SHA1
77844cba4deaae8b2af15c71899b1dd8ddc51edf
-
SHA256
6291e62fef34927bc7c8110bc2e079e728f21ba730b09be821983c1d4fbfde59
-
SHA512
fd9a70d8521a8f7464c981f3d0f3158485cc11de1e49e4fb4b5f59760524e9b9037d43d1e9b71813ccb8627b8128b0d43e5d6c5e8ca73b9863643241c91e4134
-
SSDEEP
12288:mCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:zk9P7nCvX6MNYLIbgYJ3chra+GbrL
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1