General

  • Target

    dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe

  • Size

    183KB

  • Sample

    250201-wps7lawlaj

  • MD5

    ffba4d3836584b69e0e2e678a6810896

  • SHA1

    e9f63a17c22460537d35d81bf5fb6c258b578d53

  • SHA256

    dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd

  • SHA512

    f1502bea8f80209f2db22ec02ecb89de554b7d72e5a8afbd36df4f6369d040feb90f842abc39ca35712cdde0995cdac8bad175e40b4ed26f5d899f2eefc9c4c9

  • SSDEEP

    3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm4:YenoC/YgtTcKCzIbgJlaqYJCtxbFbN

Malware Config

Targets

    • Target

      dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd.exe

    • Size

      183KB

    • MD5

      ffba4d3836584b69e0e2e678a6810896

    • SHA1

      e9f63a17c22460537d35d81bf5fb6c258b578d53

    • SHA256

      dc1552f07b340b6429f306909bfe7d8676ed6e96e6963d0ad51b0002b8e2bfcd

    • SHA512

      f1502bea8f80209f2db22ec02ecb89de554b7d72e5a8afbd36df4f6369d040feb90f842abc39ca35712cdde0995cdac8bad175e40b4ed26f5d899f2eefc9c4c9

    • SSDEEP

      3072:YengzC/YgWeTc+rCgiI0Qk9LFcuIiWq33YrK05saI9PB7TOcgZ7rQSJIhtm4:YenoC/YgtTcKCzIbgJlaqYJCtxbFbN

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks