General

  • Target

    2047a22346a62ee2160ebe2b34f5bdb4_JaffaCakes118

  • Size

    642KB

  • Sample

    240702-wfqecaycjq

  • MD5

    2047a22346a62ee2160ebe2b34f5bdb4

  • SHA1

    36774bafe50e0851cd43e8047129b71d7d5bcaa3

  • SHA256

    d2fcae8d2d3fdb3adf86d211d64019ddda1ce37e6223850fe38b3b855d6bf438

  • SHA512

    8d9ed25968009e23651e72976d901c539e4759f888185302f6ec3ff8574ad74ca81c85e9457d9e155a0ef1167db86050b8d51c35aab2889801ec2f9a0df7f338

  • SSDEEP

    12288:IcD66qJQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQRp:IZLtwCc26uGi2VCHXSBzTaDMsAQRp

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

xxxxxx

C2

krkr.no-ip.biz:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    msn.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Targets

    • Target

      2047a22346a62ee2160ebe2b34f5bdb4_JaffaCakes118

    • Size

      642KB

    • MD5

      2047a22346a62ee2160ebe2b34f5bdb4

    • SHA1

      36774bafe50e0851cd43e8047129b71d7d5bcaa3

    • SHA256

      d2fcae8d2d3fdb3adf86d211d64019ddda1ce37e6223850fe38b3b855d6bf438

    • SHA512

      8d9ed25968009e23651e72976d901c539e4759f888185302f6ec3ff8574ad74ca81c85e9457d9e155a0ef1167db86050b8d51c35aab2889801ec2f9a0df7f338

    • SSDEEP

      12288:IcD66qJQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQRp:IZLtwCc26uGi2VCHXSBzTaDMsAQRp

    Score
    8/10
    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks