General
-
Target
9fd187f3932c81656d255e528cbe41ca_JaffaCakes118
-
Size
416KB
-
Sample
240816-y9s4fayeql
-
MD5
9fd187f3932c81656d255e528cbe41ca
-
SHA1
5eba11866de746e2e60dd803c22722ff70905df7
-
SHA256
658b5002529a1dfafda5fac37d00d79f9d1dadd8b6f206e68d8ddc8de7a39779
-
SHA512
06270ef28791626894584a67a3c44f2baf8f42371028e39d15807dd7402be3dd48ca5c57ec6825502a3312120546d6d3d1eea8b7a8d33d17d00ff8e58ce826a5
-
SSDEEP
6144:hI08XA9TqSxddp/vz15HbG9zuoC3hC5OFLPnm1KNJ9WXsi9RAVb3rolVdfhV:+0CAvdddx5Hy9zuvRBLPm1KUtRCifhV
Static task
static1
Behavioral task
behavioral1
Sample
9fd187f3932c81656d255e528cbe41ca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9fd187f3932c81656d255e528cbe41ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
cybergate
v1.07.5
Java drive by
rjomer.zapto.org:81
rjomersadam.zapto.org:81
6CTJVC3I5XNKBQ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
kies.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Your kies patch sucess
-
message_box_title
Patcher
-
password
loverz
Extracted
latentbot
rjomersadam.zapto.org
Targets
-
-
Target
9fd187f3932c81656d255e528cbe41ca_JaffaCakes118
-
Size
416KB
-
MD5
9fd187f3932c81656d255e528cbe41ca
-
SHA1
5eba11866de746e2e60dd803c22722ff70905df7
-
SHA256
658b5002529a1dfafda5fac37d00d79f9d1dadd8b6f206e68d8ddc8de7a39779
-
SHA512
06270ef28791626894584a67a3c44f2baf8f42371028e39d15807dd7402be3dd48ca5c57ec6825502a3312120546d6d3d1eea8b7a8d33d17d00ff8e58ce826a5
-
SSDEEP
6144:hI08XA9TqSxddp/vz15HbG9zuoC3hC5OFLPnm1KNJ9WXsi9RAVb3rolVdfhV:+0CAvdddx5Hy9zuvRBLPm1KUtRCifhV
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1