General

  • Target

    JaffaCakes118_6b0100f1be7c2c76db65f6a1150c72de

  • Size

    840KB

  • Sample

    250103-h1wj7stna1

  • MD5

    6b0100f1be7c2c76db65f6a1150c72de

  • SHA1

    0bafb1b431c6649f46579b878a3c561f5d9caeb1

  • SHA256

    c61a615926bc8de9754ee7af0fe8e3adf2df35455abff531b81cf33142196d25

  • SHA512

    4bb35c0b0a5bebd743a7e3eb178e048ec3d57344984030736e624aba32b36bfdeee8afc46f8d133e282438486534909f0f48e55c13e489658d00329824287290

  • SSDEEP

    12288:oCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:1k9P7nCvX6MNYLIbgYJ3chra+GbrL

Malware Config

Targets

    • Target

      JaffaCakes118_6b0100f1be7c2c76db65f6a1150c72de

    • Size

      840KB

    • MD5

      6b0100f1be7c2c76db65f6a1150c72de

    • SHA1

      0bafb1b431c6649f46579b878a3c561f5d9caeb1

    • SHA256

      c61a615926bc8de9754ee7af0fe8e3adf2df35455abff531b81cf33142196d25

    • SHA512

      4bb35c0b0a5bebd743a7e3eb178e048ec3d57344984030736e624aba32b36bfdeee8afc46f8d133e282438486534909f0f48e55c13e489658d00329824287290

    • SSDEEP

      12288:oCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:1k9P7nCvX6MNYLIbgYJ3chra+GbrL

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks