General

  • Target

    f1b2adc9a2350b666a90603576a6925a870e94e8ba9ac734dc9761cd29a8d07f.exe

  • Size

    174KB

  • Sample

    250125-t2b3qssngr

  • MD5

    7dc785415ad5e751a532f458f22f9b7d

  • SHA1

    ec4b931eb061e97591af530357c93e5afe337464

  • SHA256

    f1b2adc9a2350b666a90603576a6925a870e94e8ba9ac734dc9761cd29a8d07f

  • SHA512

    73031db8f98e7c7ee61512266f397b32740c009c5d93f9ed00e079690d15550528a5aa49869d05009fde652e2be825549a891e7ee0e428a713282abe44455f93

  • SSDEEP

    3072:2vW+2IUadlM4GD8hzSyM6kb5G1zIRObix0AoMBiOKoYkEI52Ap+hlmlzeHh4/T8C:2vW+Br6epkb5G1MRN0cBiroYI2Qlzb8C

Malware Config

Targets

    • Target

      f1b2adc9a2350b666a90603576a6925a870e94e8ba9ac734dc9761cd29a8d07f.exe

    • Size

      174KB

    • MD5

      7dc785415ad5e751a532f458f22f9b7d

    • SHA1

      ec4b931eb061e97591af530357c93e5afe337464

    • SHA256

      f1b2adc9a2350b666a90603576a6925a870e94e8ba9ac734dc9761cd29a8d07f

    • SHA512

      73031db8f98e7c7ee61512266f397b32740c009c5d93f9ed00e079690d15550528a5aa49869d05009fde652e2be825549a891e7ee0e428a713282abe44455f93

    • SSDEEP

      3072:2vW+2IUadlM4GD8hzSyM6kb5G1zIRObix0AoMBiOKoYkEI52Ap+hlmlzeHh4/T8C:2vW+Br6epkb5G1MRN0cBiroYI2Qlzb8C

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks