General
-
Target
d0b9ad24b88c20afe9a0a93276f9ce77_JaffaCakes118
-
Size
1.3MB
-
Sample
241207-feqeyswrfs
-
MD5
d0b9ad24b88c20afe9a0a93276f9ce77
-
SHA1
2f4f73a50336b0a861b6d6b932d882c66b6fd251
-
SHA256
89055bcd90820f45b6aa2cbdb2f382ff96340e5a0d769747a33a6f714543f125
-
SHA512
6584c80a7f9cd958210e7b34c31f073e0161837ae591f21c5017485a4e8fb6fab4e2f432f04dfc6a0a5f1e152d538a41455856886e20efaaa9f51789202af111
-
SSDEEP
24576:v2U69Pk9S58iBlVc7ZrjFe9pyhnxuJqc4s3B+6Tsir5DoWHG8YaXag:v2F9Pp2/FapA0Jn+KrR+aV
Static task
static1
Behavioral task
behavioral1
Sample
d0b9ad24b88c20afe9a0a93276f9ce77_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
2.6
yeni-
sancar1979.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
net
-
install_file
winloq.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
Targets
-
-
Target
d0b9ad24b88c20afe9a0a93276f9ce77_JaffaCakes118
-
Size
1.3MB
-
MD5
d0b9ad24b88c20afe9a0a93276f9ce77
-
SHA1
2f4f73a50336b0a861b6d6b932d882c66b6fd251
-
SHA256
89055bcd90820f45b6aa2cbdb2f382ff96340e5a0d769747a33a6f714543f125
-
SHA512
6584c80a7f9cd958210e7b34c31f073e0161837ae591f21c5017485a4e8fb6fab4e2f432f04dfc6a0a5f1e152d538a41455856886e20efaaa9f51789202af111
-
SSDEEP
24576:v2U69Pk9S58iBlVc7ZrjFe9pyhnxuJqc4s3B+6Tsir5DoWHG8YaXag:v2F9Pp2/FapA0Jn+KrR+aV
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2