General

  • Target

    JaffaCakes118_6e061e8acbcf772acc672387655ce30e

  • Size

    840KB

  • Sample

    250103-vad9fswpcj

  • MD5

    6e061e8acbcf772acc672387655ce30e

  • SHA1

    6811f9319d9bfc44aa2091834dbeaedb295ceeec

  • SHA256

    f53f821eea1870df2848f7738d2b92f66f5129f66a2f2e8d49796227552e0546

  • SHA512

    75d18e3e002a10291971e4cbe4ecd4f4d65a2b523bca467e4045130c00ba0c896f770fda675fd4f1334dfd27e709efc156dcbea3623b3d92d1d0191f7daad434

  • SSDEEP

    12288:/CpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:qk9P7nCvX6MNYLIbgYJ3chra+GbrL

Malware Config

Targets

    • Target

      JaffaCakes118_6e061e8acbcf772acc672387655ce30e

    • Size

      840KB

    • MD5

      6e061e8acbcf772acc672387655ce30e

    • SHA1

      6811f9319d9bfc44aa2091834dbeaedb295ceeec

    • SHA256

      f53f821eea1870df2848f7738d2b92f66f5129f66a2f2e8d49796227552e0546

    • SHA512

      75d18e3e002a10291971e4cbe4ecd4f4d65a2b523bca467e4045130c00ba0c896f770fda675fd4f1334dfd27e709efc156dcbea3623b3d92d1d0191f7daad434

    • SSDEEP

      12288:/CpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:qk9P7nCvX6MNYLIbgYJ3chra+GbrL

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks