General
-
Target
JaffaCakes118_78fbe923f18ef15502eb291f8f59b8b8
-
Size
472KB
-
Sample
250104-lprzestpaw
-
MD5
78fbe923f18ef15502eb291f8f59b8b8
-
SHA1
847ec0db408043ae272120a1f711685e2b681e60
-
SHA256
db5c56922ce073f44f39dad675bee32140eac3360ed3864453d09b772e7f04e1
-
SHA512
350a731925a33478768dedf2695c5eb81344ad5834e2daf0ce29b9c9e5e99656e6f9495f0a86f1ebeacb97b87a7f10ad4312ebc4febc2ca73a8861a566b3a472
-
SSDEEP
6144:hAk4qmrpOFRnTV2iqefCQWR7WSDuBMLPb8FEyj21M163E4H9/:F9B2r2LSDuOEEyj21Q63B
Behavioral task
behavioral1
Sample
JaffaCakes118_78fbe923f18ef15502eb291f8f59b8b8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_78fbe923f18ef15502eb291f8f59b8b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
2.6
ÔÇÊ ãÓäÌÑ ÇáßáÈ
dardesh.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
services.exe
-
install_file
sse.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
123451
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_78fbe923f18ef15502eb291f8f59b8b8
-
Size
472KB
-
MD5
78fbe923f18ef15502eb291f8f59b8b8
-
SHA1
847ec0db408043ae272120a1f711685e2b681e60
-
SHA256
db5c56922ce073f44f39dad675bee32140eac3360ed3864453d09b772e7f04e1
-
SHA512
350a731925a33478768dedf2695c5eb81344ad5834e2daf0ce29b9c9e5e99656e6f9495f0a86f1ebeacb97b87a7f10ad4312ebc4febc2ca73a8861a566b3a472
-
SSDEEP
6144:hAk4qmrpOFRnTV2iqefCQWR7WSDuBMLPb8FEyj21M163E4H9/:F9B2r2LSDuOEEyj21Q63B
-
Cybergate family
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2