General

  • Target

    JaffaCakes118_1877feb6e407093128a28626866b2f26

  • Size

    183KB

  • Sample

    250123-slqqhsvnep

  • MD5

    1877feb6e407093128a28626866b2f26

  • SHA1

    5eb5ba8248b44b1fa9bedd9612919c15ef60ed1e

  • SHA256

    c6b9679696616245c5e6ef3c18fd29cec980148acc7a697126cc4888907d9336

  • SHA512

    0ce2be002955689e6344230a7f60360abf9fcf1e1932f924f3c96fb70314b4a15a27cb8d3e7306d3d79fbd7fb3c5ebe528a61e0cd19ae1651f15f9b7a9916350

  • SSDEEP

    3072:IVVpOdS+S25tOwnemQrRRqSAp4CPDCWjT+f+7KQadIUU3mr180bDoa33tRU0AQ6H:S4S+S2fUqS/iWWM+uQJUU3m5zDUlsJzo

Malware Config

Targets

    • Target

      JaffaCakes118_1877feb6e407093128a28626866b2f26

    • Size

      183KB

    • MD5

      1877feb6e407093128a28626866b2f26

    • SHA1

      5eb5ba8248b44b1fa9bedd9612919c15ef60ed1e

    • SHA256

      c6b9679696616245c5e6ef3c18fd29cec980148acc7a697126cc4888907d9336

    • SHA512

      0ce2be002955689e6344230a7f60360abf9fcf1e1932f924f3c96fb70314b4a15a27cb8d3e7306d3d79fbd7fb3c5ebe528a61e0cd19ae1651f15f9b7a9916350

    • SSDEEP

      3072:IVVpOdS+S25tOwnemQrRRqSAp4CPDCWjT+f+7KQadIUU3mr180bDoa33tRU0AQ6H:S4S+S2fUqS/iWWM+uQJUU3m5zDUlsJzo

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks