General

  • Target

    JaffaCakes118_0e4aababa44e7c791885d4a1008bee08

  • Size

    168KB

  • Sample

    250112-pbmdka1qbz

  • MD5

    0e4aababa44e7c791885d4a1008bee08

  • SHA1

    bb938024657863666262cdeec834cf077679f973

  • SHA256

    16eac02ab1978d841957f0fa1860f25caa6c5cfa5f684fa4f941416b58dab1bb

  • SHA512

    bcd9a9acb938147bea1d5c5807a27df60728637e36c49096d21352df7ef4d28d211ddbc2212795c0b65ecb84492817c57625eee81b47e400b3a1fa20a6c4fcc8

  • SSDEEP

    3072:JSl1S5zLQDDh10NRW3/n2kJWQvitdEZzK50CkF0VWfwG84CZxjOSOU2YOto9eJ:yUCDDhK63/2kJpa7EZzFF0co/4CPjjY2

Malware Config

Targets

    • Target

      JaffaCakes118_0e4aababa44e7c791885d4a1008bee08

    • Size

      168KB

    • MD5

      0e4aababa44e7c791885d4a1008bee08

    • SHA1

      bb938024657863666262cdeec834cf077679f973

    • SHA256

      16eac02ab1978d841957f0fa1860f25caa6c5cfa5f684fa4f941416b58dab1bb

    • SHA512

      bcd9a9acb938147bea1d5c5807a27df60728637e36c49096d21352df7ef4d28d211ddbc2212795c0b65ecb84492817c57625eee81b47e400b3a1fa20a6c4fcc8

    • SSDEEP

      3072:JSl1S5zLQDDh10NRW3/n2kJWQvitdEZzK50CkF0VWfwG84CZxjOSOU2YOto9eJ:yUCDDhK63/2kJpa7EZzFF0co/4CPjjY2

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks