General

  • Target

    JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb

  • Size

    484KB

  • Sample

    250329-y7hjxssyat

  • MD5

    97fe6db4a3c910d9d72b42a67cb134cb

  • SHA1

    34f7776cade03b11cbdcc05f10e78b427a390c76

  • SHA256

    5428b0d1a7635a415eba28ee76fb577b2d0caa6d2c36d2308e0b2372872015dc

  • SHA512

    39036a7fe8f50220dcd7ea97e2b6a6235e2425523d942f4c49d9dc9f4193c4a2402e003483fc91d9901c6ddbe3628aaeffe8799be64a5694919558f413e01428

  • SSDEEP

    12288:UP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:UPoBHch+uudKNffiv1aVSaPTeO

Malware Config

Targets

    • Target

      JaffaCakes118_97fe6db4a3c910d9d72b42a67cb134cb

    • Size

      484KB

    • MD5

      97fe6db4a3c910d9d72b42a67cb134cb

    • SHA1

      34f7776cade03b11cbdcc05f10e78b427a390c76

    • SHA256

      5428b0d1a7635a415eba28ee76fb577b2d0caa6d2c36d2308e0b2372872015dc

    • SHA512

      39036a7fe8f50220dcd7ea97e2b6a6235e2425523d942f4c49d9dc9f4193c4a2402e003483fc91d9901c6ddbe3628aaeffe8799be64a5694919558f413e01428

    • SSDEEP

      12288:UP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:UPoBHch+uudKNffiv1aVSaPTeO

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks