General

  • Target

    JaffaCakes118_5ceb03d5cf7132ae137d8da61c144f48

  • Size

    164KB

  • Sample

    250115-vjradayncw

  • MD5

    5ceb03d5cf7132ae137d8da61c144f48

  • SHA1

    af90857eeed667764c5171e16b17e8a21c372b88

  • SHA256

    1bf40eda2b751227f5a68a599199b8a4550461960560684621c26a59d78f3f75

  • SHA512

    157144d5c92a71a8d81505a6177a9ca1fea776e5ed7c5fc5d98716661fa4c5577026d2f83587c2bc436ebf0e49fcdd95e1ad6e92c295ca2506dfe29e2b7dffb8

  • SSDEEP

    3072:KdduTVyYUZe9qlvR2ywQJKY1NJUka1K3+rMqfFHYTYK7m4bnKWgBPLg8pd4xm:0EMYUgzywQJFO1K3+rxydbnKlg8pex

Malware Config

Targets

    • Target

      JaffaCakes118_5ceb03d5cf7132ae137d8da61c144f48

    • Size

      164KB

    • MD5

      5ceb03d5cf7132ae137d8da61c144f48

    • SHA1

      af90857eeed667764c5171e16b17e8a21c372b88

    • SHA256

      1bf40eda2b751227f5a68a599199b8a4550461960560684621c26a59d78f3f75

    • SHA512

      157144d5c92a71a8d81505a6177a9ca1fea776e5ed7c5fc5d98716661fa4c5577026d2f83587c2bc436ebf0e49fcdd95e1ad6e92c295ca2506dfe29e2b7dffb8

    • SSDEEP

      3072:KdduTVyYUZe9qlvR2ywQJKY1NJUka1K3+rMqfFHYTYK7m4bnKWgBPLg8pd4xm:0EMYUgzywQJFO1K3+rxydbnKlg8pex

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks