General
-
Target
e8d1af953add9706e906233873009b42_JaffaCakes118
-
Size
666KB
-
Sample
241212-3l1ktssrgr
-
MD5
e8d1af953add9706e906233873009b42
-
SHA1
08fcbf07210d09c3d438b7b9238fb7f0b21f7147
-
SHA256
9de01e55b010c88826c382fc3b590fb520ec454c4f8033b9cd3a74666c4bfa23
-
SHA512
7954f3473d27d07c259aec68b577661465f9d41ef766a137151684060c914066d4bfe29ed70b87a9f3ee8cb562546e6f53b108b37558aaa161bb322a33b22455
-
SSDEEP
12288:ier1fZ+KXSxYuYQw9Wv0rrGPGzbtYDk+/TCd4xy//Br843v0/qrb4s0TRbGnkxq9:is1fZ+wWYQw9Wv0PGPGz+w+rCd4xy//j
Static task
static1
Behavioral task
behavioral1
Sample
e8d1af953add9706e906233873009b42_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
vítima
127.0.0.1:90
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
spynet
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
e8d1af953add9706e906233873009b42_JaffaCakes118
-
Size
666KB
-
MD5
e8d1af953add9706e906233873009b42
-
SHA1
08fcbf07210d09c3d438b7b9238fb7f0b21f7147
-
SHA256
9de01e55b010c88826c382fc3b590fb520ec454c4f8033b9cd3a74666c4bfa23
-
SHA512
7954f3473d27d07c259aec68b577661465f9d41ef766a137151684060c914066d4bfe29ed70b87a9f3ee8cb562546e6f53b108b37558aaa161bb322a33b22455
-
SSDEEP
12288:ier1fZ+KXSxYuYQw9Wv0rrGPGzbtYDk+/TCd4xy//Br843v0/qrb4s0TRbGnkxq9:is1fZ+wWYQw9Wv0PGPGz+w+rCd4xy//j
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2