General

  • Target

    JaffaCakes118_e47a0ac0a078d39c328722e1bb379c21

  • Size

    185KB

  • Sample

    250120-mk8xtavnbj

  • MD5

    e47a0ac0a078d39c328722e1bb379c21

  • SHA1

    8f3ebf1174136f75634b2e9b5a1728842d064390

  • SHA256

    4f44e138132a99385a0c26381412a06736d62be736cdbc062fe4dc4c6e3a847b

  • SHA512

    957161bb72ccbba8aa9250139c3b5e3e3a03c987055c991f15b616cbefc3d09c624361fb63f894cf84fad884049e3988ffa8c1921b0ef23c07151bbb9fe9e90c

  • SSDEEP

    3072:pLNmKrY2wW7KultckLEael5a00ciGS6725W8ZRfCdzvFVK6/U8WRG5OXc:x1rN37KYtc1Nl5aYMi20SCNvn/iRAO

Malware Config

Targets

    • Target

      JaffaCakes118_e47a0ac0a078d39c328722e1bb379c21

    • Size

      185KB

    • MD5

      e47a0ac0a078d39c328722e1bb379c21

    • SHA1

      8f3ebf1174136f75634b2e9b5a1728842d064390

    • SHA256

      4f44e138132a99385a0c26381412a06736d62be736cdbc062fe4dc4c6e3a847b

    • SHA512

      957161bb72ccbba8aa9250139c3b5e3e3a03c987055c991f15b616cbefc3d09c624361fb63f894cf84fad884049e3988ffa8c1921b0ef23c07151bbb9fe9e90c

    • SSDEEP

      3072:pLNmKrY2wW7KultckLEael5a00ciGS6725W8ZRfCdzvFVK6/U8WRG5OXc:x1rN37KYtc1Nl5aYMi20SCNvn/iRAO

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks