General

  • Target

    JaffaCakes118_96ec1f741a8f6aef5501048c1f6cbf81

  • Size

    204KB

  • Sample

    250329-ytn5js1nz5

  • MD5

    96ec1f741a8f6aef5501048c1f6cbf81

  • SHA1

    05162ccca467d38f1fba3196385d12ae0de9aeb5

  • SHA256

    fb2564fbb02c8a5253a33a7af624c1c1c5fc896e34188f1c64c0f4ef99dcda81

  • SHA512

    c481a90c3425ee8ee01112c02fc534c50186db0aa165a122b77d60921b2f7510cd26d0c3f5f08562d55d9df8e66289460b147b1aad11e7d891a7bbf35c306d9b

  • SSDEEP

    6144:QQ4qCMLgpZ5Ip7AKCSkvEXtMSpGf8h68LcDI:n57nCbvE+Sgc6BD

Malware Config

Targets

    • Target

      JaffaCakes118_96ec1f741a8f6aef5501048c1f6cbf81

    • Size

      204KB

    • MD5

      96ec1f741a8f6aef5501048c1f6cbf81

    • SHA1

      05162ccca467d38f1fba3196385d12ae0de9aeb5

    • SHA256

      fb2564fbb02c8a5253a33a7af624c1c1c5fc896e34188f1c64c0f4ef99dcda81

    • SHA512

      c481a90c3425ee8ee01112c02fc534c50186db0aa165a122b77d60921b2f7510cd26d0c3f5f08562d55d9df8e66289460b147b1aad11e7d891a7bbf35c306d9b

    • SSDEEP

      6144:QQ4qCMLgpZ5Ip7AKCSkvEXtMSpGf8h68LcDI:n57nCbvE+Sgc6BD

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks