General

  • Target

    JaffaCakes118_94caf308a97bbad2651559e259f16947

  • Size

    177KB

  • Sample

    250329-x685tasscz

  • MD5

    94caf308a97bbad2651559e259f16947

  • SHA1

    e6de5e3f9254a7d8c3c20c5bb0132afd4d6c3a50

  • SHA256

    2917ed24233aa8367a436a01c0e55c949b63f406c534e0c2ec0e27927f2c855f

  • SHA512

    49811a6deabe5e67c0806a08077e9a700257ea2bb36d9fab4bea9b8c67787003dbe7590ea9a239ecc74e10f397bbb87a8f7545a720b62ff192c2aba35872bf96

  • SSDEEP

    3072:qooe1b2we2OXlerZ9nJmxQyWRH2QUgPKTU2qz:qDe1ywfq0/qQyWYQ5Kw2

Malware Config

Targets

    • Target

      JaffaCakes118_94caf308a97bbad2651559e259f16947

    • Size

      177KB

    • MD5

      94caf308a97bbad2651559e259f16947

    • SHA1

      e6de5e3f9254a7d8c3c20c5bb0132afd4d6c3a50

    • SHA256

      2917ed24233aa8367a436a01c0e55c949b63f406c534e0c2ec0e27927f2c855f

    • SHA512

      49811a6deabe5e67c0806a08077e9a700257ea2bb36d9fab4bea9b8c67787003dbe7590ea9a239ecc74e10f397bbb87a8f7545a720b62ff192c2aba35872bf96

    • SSDEEP

      3072:qooe1b2we2OXlerZ9nJmxQyWRH2QUgPKTU2qz:qDe1ywfq0/qQyWYQ5Kw2

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks