General
-
Target
73c2e2cf1d807ca3fa40f9e361feee63_JaffaCakes118
-
Size
310KB
-
Sample
241024-ps9v7awdne
-
MD5
73c2e2cf1d807ca3fa40f9e361feee63
-
SHA1
c071188d2ac6de2b4089823cc6fec42031b2d202
-
SHA256
dcc25086fae78d6e0e7d9b166e684a7dfc1fec0619c4511002baff9889e965a4
-
SHA512
786410f42178d27805580adc03446aab70cc037995b0ea731189be7334c4a630d1e8c5907d211497858b6af361f5ff64aa306726a3f06a246213c47e98a1c80e
-
SSDEEP
6144:VMGtlbbxUBA4A4st2DlEmW93WobRosBNEijgxpMR2I/M+Iayw/j3jT:OGtlbFmA4stYlEXmWPBNHg9+lSw/jv
Static task
static1
Behavioral task
behavioral1
Sample
73c2e2cf1d807ca3fa40f9e361feee63_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
2.6
vítima
infectgf.servegame.org:5631
OBIS4"ka
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
WinUpdate.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
1234
-
regkey_hkcu
IGAS
-
regkey_hklm
LOHG
Targets
-
-
Target
73c2e2cf1d807ca3fa40f9e361feee63_JaffaCakes118
-
Size
310KB
-
MD5
73c2e2cf1d807ca3fa40f9e361feee63
-
SHA1
c071188d2ac6de2b4089823cc6fec42031b2d202
-
SHA256
dcc25086fae78d6e0e7d9b166e684a7dfc1fec0619c4511002baff9889e965a4
-
SHA512
786410f42178d27805580adc03446aab70cc037995b0ea731189be7334c4a630d1e8c5907d211497858b6af361f5ff64aa306726a3f06a246213c47e98a1c80e
-
SSDEEP
6144:VMGtlbbxUBA4A4st2DlEmW93WobRosBNEijgxpMR2I/M+Iayw/j3jT:OGtlbFmA4stYlEXmWPBNHg9+lSw/jv
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2