General
-
Target
JaffaCakes118_6ae57f69bdf3432801dec85750164320
-
Size
532KB
-
Sample
250103-hm4nnatjgt
-
MD5
6ae57f69bdf3432801dec85750164320
-
SHA1
ea1ceaa1b1628ead2115757c88cd82aa7cabf0ac
-
SHA256
64e3396d6a419c84ec134885f0f4aaa4d8de6f04ffe3cbbef36c971075b49d9a
-
SHA512
213f84d7aabf234c77c8adaf2076097edecad4c6f75e9729fe3e81933a3a4fc055b25ada1fdb4f28914774bb2959e28fabc8ccb4631d7033b2aff19006a09082
-
SSDEEP
12288:YQw+NdOoa6v8n+n/mCJpezkFXOUVEnbVBHOvW1xD:vdOo/E+n/mGYk5Wnb7uvWXD
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ae57f69bdf3432801dec85750164320.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
2.6
new507
Firefox.ignorelist.com:82
drz78sv8edrj
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
dwm.exe
-
install_dir
Mozilla
-
install_file
Flash_Update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Notice: Undefined index: template in /opt/lampp/htdocs/install/index.php on line 17 Notice: Undefined index: language in /opt/lampp/htdocs/install/index.php on line 21 Notice: Use of undefined constant _logout_true - assumed '_logout_true' in /opt/lampp/htdocs/inc/_lang/english.php on line 17 Notice: Use of undefined constant _login_true - assumed '_login_true' in /opt/lampp/htdocs/inc/_lang/english.php on line 18 Notice: Use of undefined constant _login_false_pwd - assumed '_login_false_pwd' in /opt/lampp/htdocs/inc/_lang/english.php on line 19 Notice: Use of undefined constant _login_false_name - assumed '_login_false_name' in /opt/lampp/htdocs/inc/_lang/english.php on line 20 Notice: Use of undefined constant _login_not_active_map - assumed '_login_not_active_map' in /opt/lampp/htdocs/inc/_lang/english.php on line 21 Notice: Use of undefined constant _save_area - assumed '_save_area' in /opt/lampp/htdocs/inc/_lang/english.php on line 23
-
message_box_title
ERROR
-
password
1234abc
-
regkey_hkcu
Flash_Update
-
regkey_hklm
Java_Update
Targets
-
-
Target
JaffaCakes118_6ae57f69bdf3432801dec85750164320
-
Size
532KB
-
MD5
6ae57f69bdf3432801dec85750164320
-
SHA1
ea1ceaa1b1628ead2115757c88cd82aa7cabf0ac
-
SHA256
64e3396d6a419c84ec134885f0f4aaa4d8de6f04ffe3cbbef36c971075b49d9a
-
SHA512
213f84d7aabf234c77c8adaf2076097edecad4c6f75e9729fe3e81933a3a4fc055b25ada1fdb4f28914774bb2959e28fabc8ccb4631d7033b2aff19006a09082
-
SSDEEP
12288:YQw+NdOoa6v8n+n/mCJpezkFXOUVEnbVBHOvW1xD:vdOo/E+n/mGYk5Wnb7uvWXD
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2