General
-
Target
f2cdb8a246597317ecbd420497844314_JaffaCakes118
-
Size
309KB
-
Sample
241215-hm1xrsymbq
-
MD5
f2cdb8a246597317ecbd420497844314
-
SHA1
42d8f7c3a4c2933c005e3d2326111e3bc59d6efa
-
SHA256
4dd7330bf0c3811eaef57244cad645c6112a0fac41143957d70f3287161fb96a
-
SHA512
c89943527ed95b7deb678ac2493e3f5d8b1a40b66625eec0de94ce7fa26b2de442373e7435e6570919570bd43016ca3438edd750eb0b3ff92b694bd41fedd8a6
-
SSDEEP
6144:ntmAJTPah8muW6VsVjHLAVOt1sWEQj+x68qQCHnjSKTIAIjiJb:3JbMFVLFFEQjLfDSKT5Ie5
Behavioral task
behavioral1
Sample
f2cdb8a246597317ecbd420497844314_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
B
puc.no-ip.org:83
bigcrypt
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
dwm.exe
-
install_dir
Mozila
-
install_file
container.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Notice: Undefined index: template in /opt/lampp/htdocs/install/index.php on line 17 Notice: Undefined index: language in /opt/lampp/htdocs/install/index.php on line 21 Notice: Use of undefined constant _logout_true - assumed '_logout_true' in /opt/lampp/htdocs/inc/_lang/english.php on line 17 Notice: Use of undefined constant _login_true - assumed '_login_true' in /opt/lampp/htdocs/inc/_lang/english.php on line 18 Notice: Use of undefined constant _login_false_pwd - assumed '_login_false_pwd' in /opt/lampp/htdocs/inc/_lang/english.php on line 19 Notice: Use of undefined constant _login_false_name - assumed '_login_false_name' in /opt/lampp/htdocs/inc/_lang/english.php on line 20 Notice: Use of undefined constant _login_not_active_map - assumed '_login_not_active_map' in /opt/lampp/htdocs/inc/_lang/english.php on line 21 Notice: Use of undefined constant _save_area - assumed '_save_area' in /opt/lampp/htdocs/inc/_lang/english.php on line 23
-
message_box_title
ERROR
-
password
1234abc
-
regkey_hkcu
Plugin-Container
-
regkey_hklm
Plugin-Container
Targets
-
-
Target
f2cdb8a246597317ecbd420497844314_JaffaCakes118
-
Size
309KB
-
MD5
f2cdb8a246597317ecbd420497844314
-
SHA1
42d8f7c3a4c2933c005e3d2326111e3bc59d6efa
-
SHA256
4dd7330bf0c3811eaef57244cad645c6112a0fac41143957d70f3287161fb96a
-
SHA512
c89943527ed95b7deb678ac2493e3f5d8b1a40b66625eec0de94ce7fa26b2de442373e7435e6570919570bd43016ca3438edd750eb0b3ff92b694bd41fedd8a6
-
SSDEEP
6144:ntmAJTPah8muW6VsVjHLAVOt1sWEQj+x68qQCHnjSKTIAIjiJb:3JbMFVLFFEQjLfDSKT5Ie5
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2