General
-
Target
d72b7d784c7313e71b39b043637f0016_JaffaCakes118
-
Size
343KB
-
Sample
241208-p9sm8strbz
-
MD5
d72b7d784c7313e71b39b043637f0016
-
SHA1
c49d57c3b424c7279f8ec03a1fda9117c88c35d8
-
SHA256
50034d93f3efba5a9ac42fce67b1b0bf5bf0d46aa8452bd805f4a25291deec77
-
SHA512
9cf80b16a938f4eb8bad9da0d7812b23e48db436e0293300cb602062e50e741e1e14a8e8f515b4530f0b51184e987fe791ccc77be93ef737a0dcaaf19764537b
-
SSDEEP
6144:fyH7xOc6H5c6HcT66vlmaYkFQB8u2Aq3I74Kx6yq3x5VmBtt3Xczj2PqKPS5F5iw:fabiX2INIkBnMzaPqKPAd
Static task
static1
Behavioral task
behavioral1
Sample
d72b7d784c7313e71b39b043637f0016_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
Crypter
kostik.no-ip.org:88
kostik.no-ip.org:99
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
matheuscs
Targets
-
-
Target
d72b7d784c7313e71b39b043637f0016_JaffaCakes118
-
Size
343KB
-
MD5
d72b7d784c7313e71b39b043637f0016
-
SHA1
c49d57c3b424c7279f8ec03a1fda9117c88c35d8
-
SHA256
50034d93f3efba5a9ac42fce67b1b0bf5bf0d46aa8452bd805f4a25291deec77
-
SHA512
9cf80b16a938f4eb8bad9da0d7812b23e48db436e0293300cb602062e50e741e1e14a8e8f515b4530f0b51184e987fe791ccc77be93ef737a0dcaaf19764537b
-
SSDEEP
6144:fyH7xOc6H5c6HcT66vlmaYkFQB8u2Aq3I74Kx6yq3x5VmBtt3Xczj2PqKPS5F5iw:fabiX2INIkBnMzaPqKPAd
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1