General
-
Target
d92fc3e25955b9db712926d80d7ad332_JaffaCakes118
-
Size
436KB
-
Sample
240910-28ndca1erd
-
MD5
d92fc3e25955b9db712926d80d7ad332
-
SHA1
c8e1236245396cd305a13aaa29579b68ee4d84fb
-
SHA256
5a337ede4e42142f5d16aee2c771701f7fc0b0ccae2a04990c72879f7a0e339f
-
SHA512
5ad904246a03e2df62c1992438e9ed96fdf380e925f586a71c34c5b8c3034e779cf2cc45134e3149e631cd2f4383e840ba9880a85a2c966b684905f6e2c87507
-
SSDEEP
6144:+7kmT44ZhVwO5UMZUL06BdIFBA/8yFazbwtKd8p7Ud4fugBeaf399UHQLWdZjdTs:T0hed6FBAowtKd81JEfT5y
Static task
static1
Behavioral task
behavioral1
Sample
d92fc3e25955b9db712926d80d7ad332_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
K-Gee
cgufuewhuwefh.zapto.org:35879
0O6EP84GDJJXCM
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
win32
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
manfred
Extracted
latentbot
cgufuewhuwefh.zapto.org
Targets
-
-
Target
d92fc3e25955b9db712926d80d7ad332_JaffaCakes118
-
Size
436KB
-
MD5
d92fc3e25955b9db712926d80d7ad332
-
SHA1
c8e1236245396cd305a13aaa29579b68ee4d84fb
-
SHA256
5a337ede4e42142f5d16aee2c771701f7fc0b0ccae2a04990c72879f7a0e339f
-
SHA512
5ad904246a03e2df62c1992438e9ed96fdf380e925f586a71c34c5b8c3034e779cf2cc45134e3149e631cd2f4383e840ba9880a85a2c966b684905f6e2c87507
-
SSDEEP
6144:+7kmT44ZhVwO5UMZUL06BdIFBA/8yFazbwtKd8p7Ud4fugBeaf399UHQLWdZjdTs:T0hed6FBAowtKd81JEfT5y
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1