General

  • Target

    JaffaCakes118_979b6f89bd5e28f9d747361f914c5b51

  • Size

    176KB

  • Sample

    250329-y3e81a1yav

  • MD5

    979b6f89bd5e28f9d747361f914c5b51

  • SHA1

    b3e1e65aadeac329fd81282647e7888c76b9f5f1

  • SHA256

    79e42dbb5febaba9532b531145e70a910f0019b505f5909ae49d24333434f559

  • SHA512

    4e7c997dcd212773026fe5b7e64396534613b8b4f12284ed98bb7bf4f0c70dc48360f0e513263888e0500156dd984ccc93c7a17da4e799f9ea4b1c716da166b6

  • SSDEEP

    3072:ffPf5ZS37V242C9A3B8jv0lkpkPT/C0jqIZoyhXt/LJ8ZpepH5Pqn:ffvS37Y4H9A3B84mkTC02IZ7hXBLupQZ

Malware Config

Targets

    • Target

      JaffaCakes118_979b6f89bd5e28f9d747361f914c5b51

    • Size

      176KB

    • MD5

      979b6f89bd5e28f9d747361f914c5b51

    • SHA1

      b3e1e65aadeac329fd81282647e7888c76b9f5f1

    • SHA256

      79e42dbb5febaba9532b531145e70a910f0019b505f5909ae49d24333434f559

    • SHA512

      4e7c997dcd212773026fe5b7e64396534613b8b4f12284ed98bb7bf4f0c70dc48360f0e513263888e0500156dd984ccc93c7a17da4e799f9ea4b1c716da166b6

    • SSDEEP

      3072:ffPf5ZS37V242C9A3B8jv0lkpkPT/C0jqIZoyhXt/LJ8ZpepH5Pqn:ffvS37Y4H9A3B84mkTC02IZ7hXBLupQZ

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks