General
-
Target
da47a19c0f34f2e0cded780ca215cb25_JaffaCakes118
-
Size
920KB
-
Sample
241209-srvawsxjbp
-
MD5
da47a19c0f34f2e0cded780ca215cb25
-
SHA1
e46b6ba51a4ea5175e6db43e9381e593102b7868
-
SHA256
b4454fff20d91d4de533820cc7bce1bb64c74a57f4fbb7be2de2c060455a74f2
-
SHA512
6472f5dacbd0b661aa6246d99b11d6aa79a0a885e96d1923258c93e5c1b389972c52608a7ff3fd31c3177823829a28c8c0b3da740608231df1e5169632af6a90
-
SSDEEP
12288:JSGzWbcxJL7nf7AkTqn4cL7nGgnL+fx1tjFY5OkDOoIQW4RrrEK7SNAicEFG0KZF:60XmQcuARkUXdluUgIN
Static task
static1
Behavioral task
behavioral1
Sample
da47a19c0f34f2e0cded780ca215cb25_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.07.5
Remote
lenzoid.no-ip.biz:100
6KT8OD1O5271LW
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please Update your Microsoft .NET Frame
-
message_box_title
Windows Microsoft
-
password
3993548
Targets
-
-
Target
da47a19c0f34f2e0cded780ca215cb25_JaffaCakes118
-
Size
920KB
-
MD5
da47a19c0f34f2e0cded780ca215cb25
-
SHA1
e46b6ba51a4ea5175e6db43e9381e593102b7868
-
SHA256
b4454fff20d91d4de533820cc7bce1bb64c74a57f4fbb7be2de2c060455a74f2
-
SHA512
6472f5dacbd0b661aa6246d99b11d6aa79a0a885e96d1923258c93e5c1b389972c52608a7ff3fd31c3177823829a28c8c0b3da740608231df1e5169632af6a90
-
SSDEEP
12288:JSGzWbcxJL7nf7AkTqn4cL7nGgnL+fx1tjFY5OkDOoIQW4RrrEK7SNAicEFG0KZF:60XmQcuARkUXdluUgIN
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-