General
-
Target
JaffaCakes118_7a830132ac306920922244bc077bce30
-
Size
379KB
-
Sample
250104-s82fjawkbw
-
MD5
7a830132ac306920922244bc077bce30
-
SHA1
08139f389fc4e9566e9fa7c6625d15372df11066
-
SHA256
c730a71afd732dd54907e2139585271e826eb1333a960b17d50e4d3baab0c090
-
SHA512
28edb4a69aa261b2acec0c0880bcf1e4a18d565513c47eef341602aabb14868253902370827992a9c6f577130e054139b446c2744b49ed552866d8461547072d
-
SSDEEP
6144:80rNb5SOmlvbRzJvzspZBtGVZkroV1wfBazc/9NkSAJQN0MYT4qZf:805b5SOmlvdz2pEyMV1yBaCNAyyfEqt
Static task
static1
Behavioral task
behavioral1
Sample
Dealer police Journalist & PL rate reveiew.exe
Resource
win7-20240708-en
Malware Config
Extracted
cybergate
v1.07.5
catlogue1
adeboyeking.zapto.org:6900
118G36J8VIV817
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
12345
Extracted
latentbot
adeboyeking.zapto.org
Targets
-
-
Target
Dealer police Journalist & PL rate reveiew.exe
-
Size
656KB
-
MD5
26ee650364f056cee6a1e7c0364d3daf
-
SHA1
31de83d98c3c122184f50191b3a92ff08cde62b6
-
SHA256
be744439745584f2cd78738e2583a1ec1c795181e80d10598038355fd13ca2d8
-
SHA512
1800a2493d453b769939b9cce4492cc4187094fdfdee33dc37f0af7a5422c4d7a3f6ce67362e78d3b01418f891803cf03379b3e26fa035f587c3960aeb060887
-
SSDEEP
6144:KNb50OmlvbRzpv1sFZBPGVZkroV18HBaza/9NkS2JQNuG3fabRoT:eb50OmlvdzwFOyMV1oBaUN2y8G3k
-
Cybergate family
-
Latentbot family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2