General

  • Target

    JaffaCakes118_b3e230b5f5df4053a471bdf1b87acefa

  • Size

    280KB

  • Sample

    250118-zdhhhavkbk

  • MD5

    b3e230b5f5df4053a471bdf1b87acefa

  • SHA1

    e669ef7d4eb7f0f232f7a75e6898698c75e2a037

  • SHA256

    6b143fa3e7bfd6eebd6e5fb1b68437d362f17086c47e9f764319d27eb7f962b4

  • SHA512

    235f484546454fb9c982c6c41f89202d27f264dbc17d0da0c37a83aeebe12a202318ad7bbf1a6181ef896e13cb7f70391cb3b0daa20600755eed04497c6969b3

  • SSDEEP

    6144:hbesPGOHP4+MnCqHgqX/xRLteU5N29l1JAueHzLv:xeaG6PqCqAqX/hdIXkHn

Malware Config

Targets

    • Target

      JaffaCakes118_b3e230b5f5df4053a471bdf1b87acefa

    • Size

      280KB

    • MD5

      b3e230b5f5df4053a471bdf1b87acefa

    • SHA1

      e669ef7d4eb7f0f232f7a75e6898698c75e2a037

    • SHA256

      6b143fa3e7bfd6eebd6e5fb1b68437d362f17086c47e9f764319d27eb7f962b4

    • SHA512

      235f484546454fb9c982c6c41f89202d27f264dbc17d0da0c37a83aeebe12a202318ad7bbf1a6181ef896e13cb7f70391cb3b0daa20600755eed04497c6969b3

    • SSDEEP

      6144:hbesPGOHP4+MnCqHgqX/xRLteU5N29l1JAueHzLv:xeaG6PqCqAqX/hdIXkHn

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks