General

  • Target

    JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9

  • Size

    187KB

  • Sample

    250329-yyagyszxez

  • MD5

    973ad6b1d0d4ed587a9daff89170b2c9

  • SHA1

    407101eb9884a60779c0099064303e45d54b7afa

  • SHA256

    415596545efdc9e7d8ecd2fc2db70ed8ff6ff9246ed8e8721d873beae24b37ca

  • SHA512

    6e76c783a20cb8fea7c008be79fd737fce6bdd4afd6613a69f743cc32ff22bb74330068783b1eeecef30d7b00573b2d0e9ba11f7b703cc8cb05c15b3ace07a93

  • SSDEEP

    3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo

Malware Config

Targets

    • Target

      JaffaCakes118_973ad6b1d0d4ed587a9daff89170b2c9

    • Size

      187KB

    • MD5

      973ad6b1d0d4ed587a9daff89170b2c9

    • SHA1

      407101eb9884a60779c0099064303e45d54b7afa

    • SHA256

      415596545efdc9e7d8ecd2fc2db70ed8ff6ff9246ed8e8721d873beae24b37ca

    • SHA512

      6e76c783a20cb8fea7c008be79fd737fce6bdd4afd6613a69f743cc32ff22bb74330068783b1eeecef30d7b00573b2d0e9ba11f7b703cc8cb05c15b3ace07a93

    • SSDEEP

      3072:umpgG33H1u5F79GNgPrnw+fg+UbH8eIA6EfI73VrarwObkeLpp+RuDN4o:mwHobkCbw+fAmdzLparwWLpgSGo

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks