General

  • Target

    JaffaCakes118_f4a299dee043b761ebda36a5d846b116

  • Size

    174KB

  • Sample

    250120-w9dmmssqgw

  • MD5

    f4a299dee043b761ebda36a5d846b116

  • SHA1

    093201cf450cd84edbc1795ae2e10fdeadc4be8d

  • SHA256

    1bd0f6b56b2962c533b700d93d47fd9d6d320068a422be7880b24b0c09eb2e10

  • SHA512

    50e5fa0a1d3fdc1f44a1261b08c88cf61b40aa2f1a91461839f91f6bc87559957bb7c94e11f5f2cdf910b5f9f50774bb899359f0cf213e7591648266a9b06b03

  • SSDEEP

    3072:N86UNmwtv6jXf0N8CeVKaQhcoh/HpDtVqECw6xjgVLLXbUPj4WZ4P2PdQLD/DbQo:ys0CzbRVX0c0/Hpb6wdVLHOf4P2PdKlj

Malware Config

Targets

    • Target

      JaffaCakes118_f4a299dee043b761ebda36a5d846b116

    • Size

      174KB

    • MD5

      f4a299dee043b761ebda36a5d846b116

    • SHA1

      093201cf450cd84edbc1795ae2e10fdeadc4be8d

    • SHA256

      1bd0f6b56b2962c533b700d93d47fd9d6d320068a422be7880b24b0c09eb2e10

    • SHA512

      50e5fa0a1d3fdc1f44a1261b08c88cf61b40aa2f1a91461839f91f6bc87559957bb7c94e11f5f2cdf910b5f9f50774bb899359f0cf213e7591648266a9b06b03

    • SSDEEP

      3072:N86UNmwtv6jXf0N8CeVKaQhcoh/HpDtVqECw6xjgVLLXbUPj4WZ4P2PdQLD/DbQo:ys0CzbRVX0c0/Hpb6wdVLHOf4P2PdKlj

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks