General
-
Target
afde651c3e7e6ff69914a00fb097d3cb_JaffaCakes118
-
Size
453KB
-
Sample
241129-jrze6stpft
-
MD5
afde651c3e7e6ff69914a00fb097d3cb
-
SHA1
0e4f9852f0570e080a0693ef4452f9825178a0a8
-
SHA256
591dc308bbd6ed79c1c83a7e474811dbd3dff12a6db804ca81a02aee2f0a9c86
-
SHA512
b5c10f493e543b9ba592777ed183030dd24cd33f465fe400f75fea12d23b92086f9c2e62f23d35f0301ef00ff968220ffe7b8ca601524b928e36828d7a94ab83
-
SSDEEP
12288:cUIVS3/VaEIGSJQo12wSMe8otvmWCq7ZR:MsNaEIGYl1UMjKmW5
Static task
static1
Behavioral task
behavioral1
Sample
afde651c3e7e6ff69914a00fb097d3cb_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
afde651c3e7e6ff69914a00fb097d3cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
2.6
Seafight Bot
troyanospesao.sytes.net:80
troyanospesao.sytes.net:81
troyanospesao.sytes.net:82
troyanospesao.sytes.net:83
troyanospesao.sytes.net:84
troyanospesao.sytes.net:85
troyanospesao.sytes.net:86
troyanospesao.sytes.net:87
troyanospesao.sytes.net:88
troyanospesao.sytes.net:89
troyanospesao.sytes.net:8080
troyanospesao.sytes.net:200
troyanospesao.sytes.net:90
Cargador
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Drivers
-
install_file
Update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Error al inicial la aplicacion porque falta el componente ocx
-
message_box_title
Seafight Bot
-
password
147147147
-
regkey_hkcu
Windows Live
-
regkey_hklm
Internet Security
Targets
-
-
Target
afde651c3e7e6ff69914a00fb097d3cb_JaffaCakes118
-
Size
453KB
-
MD5
afde651c3e7e6ff69914a00fb097d3cb
-
SHA1
0e4f9852f0570e080a0693ef4452f9825178a0a8
-
SHA256
591dc308bbd6ed79c1c83a7e474811dbd3dff12a6db804ca81a02aee2f0a9c86
-
SHA512
b5c10f493e543b9ba592777ed183030dd24cd33f465fe400f75fea12d23b92086f9c2e62f23d35f0301ef00ff968220ffe7b8ca601524b928e36828d7a94ab83
-
SSDEEP
12288:cUIVS3/VaEIGSJQo12wSMe8otvmWCq7ZR:MsNaEIGYl1UMjKmW5
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2