General

  • Target

    JaffaCakes118_601235d805470d07c077163c6017b584

  • Size

    175KB

  • Sample

    250115-ya8pvatqdk

  • MD5

    601235d805470d07c077163c6017b584

  • SHA1

    4fb03564ee9dd28ecf3664a460ee0112c4da5915

  • SHA256

    9d47e8a561e316e9c40ba27cac8c229c01ec1e5c7657f05a6eef176e5943d957

  • SHA512

    88a947b3b1ef1680f55e7205ee884a992f05da10422b008e748114dcd1222c6cf172fc5b3550fe46de2a91ee6160a6d71bcfce52282802e836ac5fe907b2ea9d

  • SSDEEP

    3072:i5c9xUdzO67/UxERxx+kNNZqf4XnmmFHTmQcAVg1y85aQ2oODU8h4vZKQi2+:ugUJUmxx+ym43zH6QcyXbBDU8hJ

Malware Config

Targets

    • Target

      JaffaCakes118_601235d805470d07c077163c6017b584

    • Size

      175KB

    • MD5

      601235d805470d07c077163c6017b584

    • SHA1

      4fb03564ee9dd28ecf3664a460ee0112c4da5915

    • SHA256

      9d47e8a561e316e9c40ba27cac8c229c01ec1e5c7657f05a6eef176e5943d957

    • SHA512

      88a947b3b1ef1680f55e7205ee884a992f05da10422b008e748114dcd1222c6cf172fc5b3550fe46de2a91ee6160a6d71bcfce52282802e836ac5fe907b2ea9d

    • SSDEEP

      3072:i5c9xUdzO67/UxERxx+kNNZqf4XnmmFHTmQcAVg1y85aQ2oODU8h4vZKQi2+:ugUJUmxx+ym43zH6QcyXbBDU8hJ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks