General

  • Target

    JaffaCakes118_44a4faacbcbdc4cd5246af1085d5b323

  • Size

    165KB

  • Sample

    250127-3ewnasyqdt

  • MD5

    44a4faacbcbdc4cd5246af1085d5b323

  • SHA1

    12222e8c2145f4b360267e480c22c68b7b714c82

  • SHA256

    7c46c16981a05b5c13e6ca25ca97536b7a1c587cff7b33e558d7315af4756411

  • SHA512

    07e384b5ce81f1b9ed443578393cf0e227cb7411b340aae8a33a25d5493cba3e35150b57175dd9effa3d8fa081c282fc83cc96ad561efa579aaa7606b665e42c

  • SSDEEP

    3072:hMMbRiYd8r+FnuJ2PaCZwXPlbPXHVO2oBvQ6xNDCnz1dShLeA184Uum9xVp:hzb0YdE3Ehih1PoBI6HDw11A184UTxV

Malware Config

Targets

    • Target

      JaffaCakes118_44a4faacbcbdc4cd5246af1085d5b323

    • Size

      165KB

    • MD5

      44a4faacbcbdc4cd5246af1085d5b323

    • SHA1

      12222e8c2145f4b360267e480c22c68b7b714c82

    • SHA256

      7c46c16981a05b5c13e6ca25ca97536b7a1c587cff7b33e558d7315af4756411

    • SHA512

      07e384b5ce81f1b9ed443578393cf0e227cb7411b340aae8a33a25d5493cba3e35150b57175dd9effa3d8fa081c282fc83cc96ad561efa579aaa7606b665e42c

    • SSDEEP

      3072:hMMbRiYd8r+FnuJ2PaCZwXPlbPXHVO2oBvQ6xNDCnz1dShLeA184Uum9xVp:hzb0YdE3Ehih1PoBI6HDw11A184UTxV

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks