General
-
Target
e449b1478058c5ddf461d5a06025d139_JaffaCakes118
-
Size
585KB
-
Sample
240916-jcrf1svhmd
-
MD5
e449b1478058c5ddf461d5a06025d139
-
SHA1
b00ac3ae82f9da9ee20073473b2068d576214154
-
SHA256
d34e16c5b5ab1334dac7cca6e9a909c210f97809219c885f9123a0c995b41e81
-
SHA512
ed90517e2ed65d47bbd6586943ab13565a3c7a109369c1ac6750abd5eb6bcbadb7026e62c0e7199a0121391fc2937d67c4b7764ba2092cc0aa992a59e110b9b7
-
SSDEEP
12288:5g0Zklvg3UFA6u9P1bzsYB2ETuGmUrdFf3a2RYCb:kJwUW6ubbgYBzuGFdFCAJ
Static task
static1
Behavioral task
behavioral1
Sample
e449b1478058c5ddf461d5a06025d139_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.04.8
remote
nuevoserver.zapto.org:2000
3SI3PC63P43WA3
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Extracted
latentbot
nuevoserver.zapto.org
Targets
-
-
Target
e449b1478058c5ddf461d5a06025d139_JaffaCakes118
-
Size
585KB
-
MD5
e449b1478058c5ddf461d5a06025d139
-
SHA1
b00ac3ae82f9da9ee20073473b2068d576214154
-
SHA256
d34e16c5b5ab1334dac7cca6e9a909c210f97809219c885f9123a0c995b41e81
-
SHA512
ed90517e2ed65d47bbd6586943ab13565a3c7a109369c1ac6750abd5eb6bcbadb7026e62c0e7199a0121391fc2937d67c4b7764ba2092cc0aa992a59e110b9b7
-
SSDEEP
12288:5g0Zklvg3UFA6u9P1bzsYB2ETuGmUrdFf3a2RYCb:kJwUW6ubbgYBzuGFdFCAJ
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1