General

  • Target

    JaffaCakes118_6db8c29690fdf3382220bc004955d31c

  • Size

    166KB

  • Sample

    250131-y8k2fayken

  • MD5

    6db8c29690fdf3382220bc004955d31c

  • SHA1

    778b2f6706ada616f688e3c4650c1419d487a113

  • SHA256

    8101e389c966ad926e94236a078b4486cd4ea3888c1fcc0dbbc2289410d10eb6

  • SHA512

    197b61a2506749a154f640fa30ddc162b13a47db30a8f8302bd9713d1fb27d71e011a3a2f44df3657d34cfc01b3209967047e0c6a055976808cb26a69dfdcecc

  • SSDEEP

    3072:uGViOCChCNwI2yF8HcEaOQLDxP2qaQaVY4jglLsyfdkBNFMOGOwCv++q4Q:uKCChCNwPOBEa1LJiNYrLBdJOGC+zB

Malware Config

Targets

    • Target

      JaffaCakes118_6db8c29690fdf3382220bc004955d31c

    • Size

      166KB

    • MD5

      6db8c29690fdf3382220bc004955d31c

    • SHA1

      778b2f6706ada616f688e3c4650c1419d487a113

    • SHA256

      8101e389c966ad926e94236a078b4486cd4ea3888c1fcc0dbbc2289410d10eb6

    • SHA512

      197b61a2506749a154f640fa30ddc162b13a47db30a8f8302bd9713d1fb27d71e011a3a2f44df3657d34cfc01b3209967047e0c6a055976808cb26a69dfdcecc

    • SSDEEP

      3072:uGViOCChCNwI2yF8HcEaOQLDxP2qaQaVY4jglLsyfdkBNFMOGOwCv++q4Q:uKCChCNwPOBEa1LJiNYrLBdJOGC+zB

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks