General

  • Target

    JaffaCakes118_956474ecd72210c214575358865f2450

  • Size

    175KB

  • Sample

    250329-yd46tswmw2

  • MD5

    956474ecd72210c214575358865f2450

  • SHA1

    786b0d547a6f35030ffc8fe9e27ff822edc2956a

  • SHA256

    8a65971453c344d8d4c2785291b49c7ae5a82941fd3988bf2b4e4101b4251112

  • SHA512

    f936a3ff264cb6004c583c7041b3c0c17306ba54e5724ce0baace6072e1d9a43ef9fe807bc8006e16ccf188cfabea1fcb2f98a927a6cac697a9b451ee6e9e1cf

  • SSDEEP

    3072:k1bTAf8jFjstbHDHJt5+JcT3wgBKSiMIx332iXORmCpIY89K76JWyZH:GbTjxODprUcsBMgGIY8o7byN

Malware Config

Targets

    • Target

      JaffaCakes118_956474ecd72210c214575358865f2450

    • Size

      175KB

    • MD5

      956474ecd72210c214575358865f2450

    • SHA1

      786b0d547a6f35030ffc8fe9e27ff822edc2956a

    • SHA256

      8a65971453c344d8d4c2785291b49c7ae5a82941fd3988bf2b4e4101b4251112

    • SHA512

      f936a3ff264cb6004c583c7041b3c0c17306ba54e5724ce0baace6072e1d9a43ef9fe807bc8006e16ccf188cfabea1fcb2f98a927a6cac697a9b451ee6e9e1cf

    • SSDEEP

      3072:k1bTAf8jFjstbHDHJt5+JcT3wgBKSiMIx332iXORmCpIY89K76JWyZH:GbTjxODprUcsBMgGIY8o7byN

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks