General
-
Target
7203f172df83b3d1119d5facbf9cbeb9_JaffaCakes118
-
Size
281KB
-
Sample
240726-bh7q7azcnd
-
MD5
7203f172df83b3d1119d5facbf9cbeb9
-
SHA1
e1a8d8a46530ff73b0a152f3410d078436af3497
-
SHA256
405b8cc9bee521219a8860f3e03bc83c50ac763fa5b0773468c1441445873288
-
SHA512
cfff7bccd23510134c4293ec2634738638f488d60728793d789549ff09235578e83d1f9a2d4da7706a0a61ac0443061557e34f26a1286cae1b27ba52ecc8555b
-
SSDEEP
6144:uy+phLTwlTLfkixFUQKf3D7TnBAZ5qhbxH:r+pJ0lYixsfvDBAzK9H
Behavioral task
behavioral1
Sample
7203f172df83b3d1119d5facbf9cbeb9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7203f172df83b3d1119d5facbf9cbeb9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
cybergate
v1.11.0 - Public Version
127.0.0.1:80
besirevic91.zapto.org:80
K5US6XM6LVM0YB
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
video.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
EROR
-
password
emir199@
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
latentbot
besirevic91.zapto.org
Targets
-
-
Target
7203f172df83b3d1119d5facbf9cbeb9_JaffaCakes118
-
Size
281KB
-
MD5
7203f172df83b3d1119d5facbf9cbeb9
-
SHA1
e1a8d8a46530ff73b0a152f3410d078436af3497
-
SHA256
405b8cc9bee521219a8860f3e03bc83c50ac763fa5b0773468c1441445873288
-
SHA512
cfff7bccd23510134c4293ec2634738638f488d60728793d789549ff09235578e83d1f9a2d4da7706a0a61ac0443061557e34f26a1286cae1b27ba52ecc8555b
-
SSDEEP
6144:uy+phLTwlTLfkixFUQKf3D7TnBAZ5qhbxH:r+pJ0lYixsfvDBAzK9H
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2