General

  • Target

    JaffaCakes118_46f38d9351f86672f187dae19f8d9c05

  • Size

    172KB

  • Sample

    250114-2hheeasjct

  • MD5

    46f38d9351f86672f187dae19f8d9c05

  • SHA1

    c94071bc1fb4dea1359c37afd654f6b03575dfca

  • SHA256

    1ed95d7ca3ae50c4b3c1ca5e898dd6e3200aef61600e90d50fb664e995c30410

  • SHA512

    9cb18bfbe88cfc47d58404b366a320b0e2fee1cf35aa556cfd24ad27211e4fde50e55a71337f880a217c68784e6a630769f175db57e4391eb180640e04d25609

  • SSDEEP

    3072:V2R5YlLBjudfOoszM4Db1BS4rrqGxvtlFfSUxuZMqCGAFWf9Dr6v/RCn17mjF:V2vKBatOowb5rqYFnhiMXFKk/R876

Malware Config

Targets

    • Target

      JaffaCakes118_46f38d9351f86672f187dae19f8d9c05

    • Size

      172KB

    • MD5

      46f38d9351f86672f187dae19f8d9c05

    • SHA1

      c94071bc1fb4dea1359c37afd654f6b03575dfca

    • SHA256

      1ed95d7ca3ae50c4b3c1ca5e898dd6e3200aef61600e90d50fb664e995c30410

    • SHA512

      9cb18bfbe88cfc47d58404b366a320b0e2fee1cf35aa556cfd24ad27211e4fde50e55a71337f880a217c68784e6a630769f175db57e4391eb180640e04d25609

    • SSDEEP

      3072:V2R5YlLBjudfOoszM4Db1BS4rrqGxvtlFfSUxuZMqCGAFWf9Dr6v/RCn17mjF:V2vKBatOowb5rqYFnhiMXFKk/R876

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks