General

  • Target

    JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673

  • Size

    275KB

  • Sample

    250122-eevt1axncm

  • MD5

    0a17de1a58a49a9c70e1fe93d2660673

  • SHA1

    613f8246544da665ac47f079fb5e14161481e3f5

  • SHA256

    19f7b9555e742866e0a4adee1cad38da969e9a930ed68e085d9a1a5a0f76ae7f

  • SHA512

    6a1af4339583fe6b0fe50948c8cf24133ae31cdd8ea42dced03d766e8b4cc5956ede82187653482589250be8ebc7b07cf407258d3fa826a49e379d6a9924f3a5

  • SSDEEP

    6144:cL9HBY8C8rq+3Na4cDbxQhZQS+5E5j/JsxHlxYB/T0zms:oZLrjNs5QhZQSEE5ajxZzl

Malware Config

Targets

    • Target

      JaffaCakes118_0a17de1a58a49a9c70e1fe93d2660673

    • Size

      275KB

    • MD5

      0a17de1a58a49a9c70e1fe93d2660673

    • SHA1

      613f8246544da665ac47f079fb5e14161481e3f5

    • SHA256

      19f7b9555e742866e0a4adee1cad38da969e9a930ed68e085d9a1a5a0f76ae7f

    • SHA512

      6a1af4339583fe6b0fe50948c8cf24133ae31cdd8ea42dced03d766e8b4cc5956ede82187653482589250be8ebc7b07cf407258d3fa826a49e379d6a9924f3a5

    • SSDEEP

      6144:cL9HBY8C8rq+3Na4cDbxQhZQS+5E5j/JsxHlxYB/T0zms:oZLrjNs5QhZQSEE5ajxZzl

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks