General

  • Target

    JaffaCakes118_6d3ad9b3fdd260b02d79050ad5bebd5a

  • Size

    287KB

  • Sample

    250131-x2hgasvjhw

  • MD5

    6d3ad9b3fdd260b02d79050ad5bebd5a

  • SHA1

    6afc60dfbcc39fa186c7cc9f1e3e53492c166c0b

  • SHA256

    6d0c40c750805bdc8dc986e420507450ab6bf1ff1f27a27950f48decac313be2

  • SHA512

    468396b57f4b00c51b9803bbfaa26013e0aea3a17cd1cf137904f40f98535c9884b6fc8efe0757d70d4b4f60212509ea7517e064e99d2c4a886691c7c61db500

  • SSDEEP

    6144:8BsR4G+igETnf9+dXvqU6KMT+qjFFSswI+pn63GxKkfjG+hAQnAf/qqZ+:8B+4G7fuCU43QswIu6WVy+hD2iqZ+

Malware Config

Targets

    • Target

      JaffaCakes118_6d3ad9b3fdd260b02d79050ad5bebd5a

    • Size

      287KB

    • MD5

      6d3ad9b3fdd260b02d79050ad5bebd5a

    • SHA1

      6afc60dfbcc39fa186c7cc9f1e3e53492c166c0b

    • SHA256

      6d0c40c750805bdc8dc986e420507450ab6bf1ff1f27a27950f48decac313be2

    • SHA512

      468396b57f4b00c51b9803bbfaa26013e0aea3a17cd1cf137904f40f98535c9884b6fc8efe0757d70d4b4f60212509ea7517e064e99d2c4a886691c7c61db500

    • SSDEEP

      6144:8BsR4G+igETnf9+dXvqU6KMT+qjFFSswI+pn63GxKkfjG+hAQnAf/qqZ+:8B+4G7fuCU43QswIu6WVy+hD2iqZ+

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks