General
-
Target
JaffaCakes118_6aa8064ba9ef54bde9a3e454908fcc9e
-
Size
362KB
-
Sample
250103-grlg7ssjds
-
MD5
6aa8064ba9ef54bde9a3e454908fcc9e
-
SHA1
6521fa791d65ae4d0b6424357b665e2eeede34a8
-
SHA256
3c9a6d65a6fda449aa56cc32e0488d9995f50fef3301db4c359d35700824228a
-
SHA512
0ba4442682eff71aa93814e5c78a63db1b5e82c7883f09eb209989609780fc3a6050252bf449ecefd0ee89a22c29bf242ae9e97ecad1e766c0b37b452bdaa474
-
SSDEEP
6144:WIdTG2OOF7rmcMJ/SHGvHgohZrgxMEkoI60d+8UvlAJXw2oDM8Pcf2MbI:W2tmcMJ/MGPnrgxYT658UdAJXwfcB
Behavioral task
behavioral1
Sample
JaffaCakes118_6aa8064ba9ef54bde9a3e454908fcc9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6aa8064ba9ef54bde9a3e454908fcc9e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.07.5
Kaizuma's Anti Method
kaizuma911.zapto.org:8080
48VKX2JS03U8SA
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
winlog
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Windows needs permission from the SQL'er or Coder to use this program please contact them and try again.
-
message_box_title
Windows HWID Access!
-
password
a097491860
-
regkey_hklm
winlog
Targets
-
-
Target
JaffaCakes118_6aa8064ba9ef54bde9a3e454908fcc9e
-
Size
362KB
-
MD5
6aa8064ba9ef54bde9a3e454908fcc9e
-
SHA1
6521fa791d65ae4d0b6424357b665e2eeede34a8
-
SHA256
3c9a6d65a6fda449aa56cc32e0488d9995f50fef3301db4c359d35700824228a
-
SHA512
0ba4442682eff71aa93814e5c78a63db1b5e82c7883f09eb209989609780fc3a6050252bf449ecefd0ee89a22c29bf242ae9e97ecad1e766c0b37b452bdaa474
-
SSDEEP
6144:WIdTG2OOF7rmcMJ/SHGvHgohZrgxMEkoI60d+8UvlAJXw2oDM8Pcf2MbI:W2tmcMJ/MGPnrgxYT658UdAJXwfcB
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1