General
-
Target
JaffaCakes118_9216496ca09fb3a615ecfec080973519
-
Size
307KB
-
Sample
250117-vkb7vaxpfj
-
MD5
9216496ca09fb3a615ecfec080973519
-
SHA1
fb6ba978f85f142a5b8d39273bb86426eecf326d
-
SHA256
2f19e157a1eb2740bd3e3c8b456f7b47d088cd8ddce02de10a86647c3acf3ea6
-
SHA512
408af6777dc22d54a41f40f787d08ab78a706856c48affe9dd7fc9762874f0c10504e3db0672a45f092e38f2c3328603c0d43a81450362d1b59349e4f08ce87b
-
SSDEEP
6144:bviqTRcsXlQIQrtmcbDt1epozkmd7jIJ/WP3K1l//Le20vU9Onho0:9VxXRAbJ1e+IuI+val/De20ve0
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9216496ca09fb3a615ecfec080973519.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
victima
servinpetraca.zapto.org:2000
4M1R6CYS2PW85P
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
Direct
-
install_file
Direct.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
System Check Incomplete
-
message_box_title
Error
-
password
1992
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
latentbot
servinpetraca.zapto.org
Targets
-
-
Target
JaffaCakes118_9216496ca09fb3a615ecfec080973519
-
Size
307KB
-
MD5
9216496ca09fb3a615ecfec080973519
-
SHA1
fb6ba978f85f142a5b8d39273bb86426eecf326d
-
SHA256
2f19e157a1eb2740bd3e3c8b456f7b47d088cd8ddce02de10a86647c3acf3ea6
-
SHA512
408af6777dc22d54a41f40f787d08ab78a706856c48affe9dd7fc9762874f0c10504e3db0672a45f092e38f2c3328603c0d43a81450362d1b59349e4f08ce87b
-
SSDEEP
6144:bviqTRcsXlQIQrtmcbDt1epozkmd7jIJ/WP3K1l//Le20vU9Onho0:9VxXRAbJ1e+IuI+val/De20ve0
-
Cybergate family
-
Latentbot family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2