General

  • Target

    JaffaCakes118_8b8e02c5f114d969b2e1d0a51adc1e99

  • Size

    276KB

  • Sample

    250329-vkbajszl14

  • MD5

    8b8e02c5f114d969b2e1d0a51adc1e99

  • SHA1

    072cb2f9ba87c7be54ecf9acc5092db930e6ff5a

  • SHA256

    2e5c48c3baebf8a7b343cf325948f7d5180d265e311c6ba9e381d3e879cd0876

  • SHA512

    2278ad84875a8431d0af3af49200ffee5e74215c3fd353c3ac8e1d0c093cf79bbf075f48039c7252dbdbacb58ff0885bc7ec1fef06ff9d2e6499fe90a4ed4f20

  • SSDEEP

    6144:pQpNUHWT2fVdpLs5Tglk0fRSeJQHWCHYgOxk2iNlf/GcqRoEpzTe:pQpNJTiDpLI0lHZSeJQf+k/NlnuzT

Malware Config

Targets

    • Target

      JaffaCakes118_8b8e02c5f114d969b2e1d0a51adc1e99

    • Size

      276KB

    • MD5

      8b8e02c5f114d969b2e1d0a51adc1e99

    • SHA1

      072cb2f9ba87c7be54ecf9acc5092db930e6ff5a

    • SHA256

      2e5c48c3baebf8a7b343cf325948f7d5180d265e311c6ba9e381d3e879cd0876

    • SHA512

      2278ad84875a8431d0af3af49200ffee5e74215c3fd353c3ac8e1d0c093cf79bbf075f48039c7252dbdbacb58ff0885bc7ec1fef06ff9d2e6499fe90a4ed4f20

    • SSDEEP

      6144:pQpNUHWT2fVdpLs5Tglk0fRSeJQHWCHYgOxk2iNlf/GcqRoEpzTe:pQpNJTiDpLI0lHZSeJQf+k/NlnuzT

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies security service

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.