General

  • Target

    4d36bdcce13c87c8f6a4315cde9a69e621155f8fb32a65413f793a9faf868572N.exe

  • Size

    175KB

  • Sample

    250125-bra4ksyjgt

  • MD5

    c3798a3caf9ef33e4f58cf8a6a588880

  • SHA1

    4b4db34ec828543ef96feeabbb888a085e492971

  • SHA256

    4d36bdcce13c87c8f6a4315cde9a69e621155f8fb32a65413f793a9faf868572

  • SHA512

    55efbee851752d401960075713027a5c8d9e5586aff1b07b712d83450c2f506284b0252bb89f648c1252a573a7b9ddaec8d709ff89ef893bd7de776c5f506e40

  • SSDEEP

    3072:KeF7Dpd7BzkiXI+wl9N/iqAx9xbWl/3u88Zw8WUL65+V3ZsXng:KeFnpXzkCwbZ/3P8RLWe3uXn

Malware Config

Targets

    • Target

      4d36bdcce13c87c8f6a4315cde9a69e621155f8fb32a65413f793a9faf868572N.exe

    • Size

      175KB

    • MD5

      c3798a3caf9ef33e4f58cf8a6a588880

    • SHA1

      4b4db34ec828543ef96feeabbb888a085e492971

    • SHA256

      4d36bdcce13c87c8f6a4315cde9a69e621155f8fb32a65413f793a9faf868572

    • SHA512

      55efbee851752d401960075713027a5c8d9e5586aff1b07b712d83450c2f506284b0252bb89f648c1252a573a7b9ddaec8d709ff89ef893bd7de776c5f506e40

    • SSDEEP

      3072:KeF7Dpd7BzkiXI+wl9N/iqAx9xbWl/3u88Zw8WUL65+V3ZsXng:KeFnpXzkCwbZ/3P8RLWe3uXn

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks