General

  • Target

    JaffaCakes118_54b31fface3ed782524316668c700c6a

  • Size

    184KB

  • Sample

    250129-j9l8kaslaw

  • MD5

    54b31fface3ed782524316668c700c6a

  • SHA1

    c3a3738fd10678dea63fbc0392025178d480919e

  • SHA256

    e4319f8866c0f9cc5cdc890fb46d7cb525379d95df9602b4d100887dcd6f4da0

  • SHA512

    ddca2772ad889187fdbf792a6618bbb97f735f0a342ac18e7502367ace8caef1dc7d653224754e810f7797f5deb9d2fe8441f267a1909f28a55ce8f80deb72f8

  • SSDEEP

    3072:T4x7IBs+h8JYDoXtxfdJht6kgoQiVqQvOW84DwIvuj9xhL2:T0EZuTdftdLVq72Ro92

Malware Config

Targets

    • Target

      JaffaCakes118_54b31fface3ed782524316668c700c6a

    • Size

      184KB

    • MD5

      54b31fface3ed782524316668c700c6a

    • SHA1

      c3a3738fd10678dea63fbc0392025178d480919e

    • SHA256

      e4319f8866c0f9cc5cdc890fb46d7cb525379d95df9602b4d100887dcd6f4da0

    • SHA512

      ddca2772ad889187fdbf792a6618bbb97f735f0a342ac18e7502367ace8caef1dc7d653224754e810f7797f5deb9d2fe8441f267a1909f28a55ce8f80deb72f8

    • SSDEEP

      3072:T4x7IBs+h8JYDoXtxfdJht6kgoQiVqQvOW84DwIvuj9xhL2:T0EZuTdftdLVq72Ro92

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks