General

  • Target

    JaffaCakes118_a12a8f0a0d9d98503d1625b14bfc387d

  • Size

    484KB

  • Sample

    250408-xrle7syyez

  • MD5

    a12a8f0a0d9d98503d1625b14bfc387d

  • SHA1

    093dd9c23451b42fdc2fef447ff38c32e0d38c98

  • SHA256

    1b9227ed19b251e129378e26e69ec4426ef826e10ac3a7ca29cfbdd4e993e5c8

  • SHA512

    5b409161682924db3a8106a90fe88797b443f57f7bc0d073501f928017b28bc567ae3b42625bd206bab8eb1ce94dcd0f6e34746584d2f027c4e5397e976004c9

  • SSDEEP

    12288:sP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:sPoBHch+uudKNffiv1aVSaPTeO

Malware Config

Targets

    • Target

      JaffaCakes118_a12a8f0a0d9d98503d1625b14bfc387d

    • Size

      484KB

    • MD5

      a12a8f0a0d9d98503d1625b14bfc387d

    • SHA1

      093dd9c23451b42fdc2fef447ff38c32e0d38c98

    • SHA256

      1b9227ed19b251e129378e26e69ec4426ef826e10ac3a7ca29cfbdd4e993e5c8

    • SHA512

      5b409161682924db3a8106a90fe88797b443f57f7bc0d073501f928017b28bc567ae3b42625bd206bab8eb1ce94dcd0f6e34746584d2f027c4e5397e976004c9

    • SSDEEP

      12288:sP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:sPoBHch+uudKNffiv1aVSaPTeO

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks