General
-
Target
ce30220f744fc085fa39cdc78454b727_JaffaCakes118
-
Size
274KB
-
Sample
240905-3xpbyavdln
-
MD5
ce30220f744fc085fa39cdc78454b727
-
SHA1
c1c5ba1c0e615e781b70627c7e1ce8965f7d75e6
-
SHA256
e8823e85c8c57c150129d372cde78f59ebccc17fc43690c3344c28f3e1c7ef7b
-
SHA512
5af81824a4ea5bea2a2d79d3c4f0c91350f975f7dbffd039c99a6a510eb522f6abd935eb661e868b3b6546ce9b6f9ecda35e17a0eca698083b33ff0549b5f4c3
-
SSDEEP
6144:+MIzUPtCLPGw+zlC021mxq8Lad40Y9WzD:+bzOALc2AzWd1Y9Wz
Behavioral task
behavioral1
Sample
ce30220f744fc085fa39cdc78454b727_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
cybergate
v1.07.5
remote
strullerool.zapto.org:1603
fooroeling.zapto.org:1603
3GDL4E8D70NPT0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
winupdater.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
mummeli1
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
latentbot
strullerool.zapto.org
Targets
-
-
Target
ce30220f744fc085fa39cdc78454b727_JaffaCakes118
-
Size
274KB
-
MD5
ce30220f744fc085fa39cdc78454b727
-
SHA1
c1c5ba1c0e615e781b70627c7e1ce8965f7d75e6
-
SHA256
e8823e85c8c57c150129d372cde78f59ebccc17fc43690c3344c28f3e1c7ef7b
-
SHA512
5af81824a4ea5bea2a2d79d3c4f0c91350f975f7dbffd039c99a6a510eb522f6abd935eb661e868b3b6546ce9b6f9ecda35e17a0eca698083b33ff0549b5f4c3
-
SSDEEP
6144:+MIzUPtCLPGw+zlC021mxq8Lad40Y9WzD:+bzOALc2AzWd1Y9Wz
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2