General

  • Target

    JaffaCakes118_7c6e6db20f851866b314a319b7b11cec

  • Size

    840KB

  • Sample

    250104-2fcq5s1jes

  • MD5

    7c6e6db20f851866b314a319b7b11cec

  • SHA1

    688eb8a901331f67715360070c65c1bdc85bb08d

  • SHA256

    e14c2d68235c8cfe855c95c29942571d5261a34b28e1b6f1d72f5a3ab3a8be10

  • SHA512

    5ee2454a0bcf69825b02464e500125143629072c292270a5be8fab639226cddfa75ba342f166df5dba4454ec0c993317da465319f32153e5617ebfe5a427deeb

  • SSDEEP

    12288:+CpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:bk9P7nCvX6MNYLIbgYJ3chra+GbrL

Malware Config

Targets

    • Target

      JaffaCakes118_7c6e6db20f851866b314a319b7b11cec

    • Size

      840KB

    • MD5

      7c6e6db20f851866b314a319b7b11cec

    • SHA1

      688eb8a901331f67715360070c65c1bdc85bb08d

    • SHA256

      e14c2d68235c8cfe855c95c29942571d5261a34b28e1b6f1d72f5a3ab3a8be10

    • SHA512

      5ee2454a0bcf69825b02464e500125143629072c292270a5be8fab639226cddfa75ba342f166df5dba4454ec0c993317da465319f32153e5617ebfe5a427deeb

    • SSDEEP

      12288:+CpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:bk9P7nCvX6MNYLIbgYJ3chra+GbrL

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks