General

  • Target

    JaffaCakes118_8ec6b9a4b2d2d8290f46686e2b9c0917

  • Size

    172KB

  • Sample

    250117-r4z68ssqcn

  • MD5

    8ec6b9a4b2d2d8290f46686e2b9c0917

  • SHA1

    233ec216ad12e8a60c4eb56cea239b64051d16bd

  • SHA256

    1ea7e9df1cfafa4d45e40928ee3c6d6185d5afbec9a48ca790e613628ae268ba

  • SHA512

    47d77de14b35d3e52d227c7b83c6eb6ae5e01988614b0efbf5f85078f879841eeef96dab83e80767caeeaed44a0f000c10041089785ac1242f5cbbc6f3f048fd

  • SSDEEP

    3072:SzKALd7NP604jXxU8Yw3jx+uBF7aNe/7IHMak6qqYoykCeoceizjZFHHemI8:kREjXxU8Yc1+ujD/7I3sq21AeEZFH+m

Malware Config

Targets

    • Target

      JaffaCakes118_8ec6b9a4b2d2d8290f46686e2b9c0917

    • Size

      172KB

    • MD5

      8ec6b9a4b2d2d8290f46686e2b9c0917

    • SHA1

      233ec216ad12e8a60c4eb56cea239b64051d16bd

    • SHA256

      1ea7e9df1cfafa4d45e40928ee3c6d6185d5afbec9a48ca790e613628ae268ba

    • SHA512

      47d77de14b35d3e52d227c7b83c6eb6ae5e01988614b0efbf5f85078f879841eeef96dab83e80767caeeaed44a0f000c10041089785ac1242f5cbbc6f3f048fd

    • SSDEEP

      3072:SzKALd7NP604jXxU8Yw3jx+uBF7aNe/7IHMak6qqYoykCeoceizjZFHHemI8:kREjXxU8Yc1+ujD/7I3sq21AeEZFH+m

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks