General
-
Target
fdc3ab1e59dffdee62a88d5f8117e6e9_JaffaCakes118
-
Size
599KB
-
Sample
241219-a48d6szpep
-
MD5
fdc3ab1e59dffdee62a88d5f8117e6e9
-
SHA1
2885a66e06476a79ea622e5ed9818a78cb3f5ccb
-
SHA256
ab72ac6dd511c32b0f3356991ba7ea37dc8a03afbed2124356e6d43e5cda4f47
-
SHA512
a228bba7f51825f5a447ac6b4c48902bcc3fe568a4f434eedd646cff815957216c2344800a2dab4257f76754e61711125d14db15a3d044a36cc7126a24ed3c80
-
SSDEEP
12288:PSlBW6VlE6DpY7Bp7t6yVksM+HeEf7UfOiJ6fVxXifIvw:PSlBJfjpY/7tt+gUfh8VxXicw
Behavioral task
behavioral1
Sample
fdc3ab1e59dffdee62a88d5f8117e6e9_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
kewell
ben23.no-ip.org:3460
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
svchost
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
admin
-
regkey_hkcu
svchost.exe
-
regkey_hklm
svchost.exe
Targets
-
-
Target
fdc3ab1e59dffdee62a88d5f8117e6e9_JaffaCakes118
-
Size
599KB
-
MD5
fdc3ab1e59dffdee62a88d5f8117e6e9
-
SHA1
2885a66e06476a79ea622e5ed9818a78cb3f5ccb
-
SHA256
ab72ac6dd511c32b0f3356991ba7ea37dc8a03afbed2124356e6d43e5cda4f47
-
SHA512
a228bba7f51825f5a447ac6b4c48902bcc3fe568a4f434eedd646cff815957216c2344800a2dab4257f76754e61711125d14db15a3d044a36cc7126a24ed3c80
-
SSDEEP
12288:PSlBW6VlE6DpY7Bp7t6yVksM+HeEf7UfOiJ6fVxXifIvw:PSlBJfjpY/7tt+gUfh8VxXicw
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1