General

  • Target

    JaffaCakes118_60addbb48b547e182553d9f8aaaae18e

  • Size

    840KB

  • Sample

    250101-z133qawrfn

  • MD5

    60addbb48b547e182553d9f8aaaae18e

  • SHA1

    77844cba4deaae8b2af15c71899b1dd8ddc51edf

  • SHA256

    6291e62fef34927bc7c8110bc2e079e728f21ba730b09be821983c1d4fbfde59

  • SHA512

    fd9a70d8521a8f7464c981f3d0f3158485cc11de1e49e4fb4b5f59760524e9b9037d43d1e9b71813ccb8627b8128b0d43e5d6c5e8ca73b9863643241c91e4134

  • SSDEEP

    12288:mCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:zk9P7nCvX6MNYLIbgYJ3chra+GbrL

Malware Config

Targets

    • Target

      JaffaCakes118_60addbb48b547e182553d9f8aaaae18e

    • Size

      840KB

    • MD5

      60addbb48b547e182553d9f8aaaae18e

    • SHA1

      77844cba4deaae8b2af15c71899b1dd8ddc51edf

    • SHA256

      6291e62fef34927bc7c8110bc2e079e728f21ba730b09be821983c1d4fbfde59

    • SHA512

      fd9a70d8521a8f7464c981f3d0f3158485cc11de1e49e4fb4b5f59760524e9b9037d43d1e9b71813ccb8627b8128b0d43e5d6c5e8ca73b9863643241c91e4134

    • SSDEEP

      12288:mCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:zk9P7nCvX6MNYLIbgYJ3chra+GbrL

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks