General
-
Target
JaffaCakes118_cf60e05c26a511a76c05706e5ec00d00
-
Size
494KB
-
Sample
250119-w1f2eazqfl
-
MD5
cf60e05c26a511a76c05706e5ec00d00
-
SHA1
bf7a1bc5fc1f6edad294385ebd667bd7b61993ed
-
SHA256
4ba875667754eb06f325f81d3ac4c6ead55d978d6552392772079df3e2fff128
-
SHA512
767f5ab5445b76fc43403e2a224a873cb6d8dc7ae0dfd5d2f4eba05ad840d13d49e64cd9467e8bb62d1b7e414297ce9ff7f9e23596fd62765fd1b0faa37d162c
-
SSDEEP
12288:l6GhjVvMW+3MJzJqPCYCgWvTwnEFhYSNx6pK:gG5VvMW+kq02np+
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cf60e05c26a511a76c05706e5ec00d00.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
2.7 Beta 02
vítima
login1.homeip.net:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
5
-
ftp_password
171850808
-
ftp_port
21
-
ftp_server
ftp.membres.lycos.fr
-
ftp_username
spynetcoder
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
hkcu
Targets
-
-
Target
JaffaCakes118_cf60e05c26a511a76c05706e5ec00d00
-
Size
494KB
-
MD5
cf60e05c26a511a76c05706e5ec00d00
-
SHA1
bf7a1bc5fc1f6edad294385ebd667bd7b61993ed
-
SHA256
4ba875667754eb06f325f81d3ac4c6ead55d978d6552392772079df3e2fff128
-
SHA512
767f5ab5445b76fc43403e2a224a873cb6d8dc7ae0dfd5d2f4eba05ad840d13d49e64cd9467e8bb62d1b7e414297ce9ff7f9e23596fd62765fd1b0faa37d162c
-
SSDEEP
12288:l6GhjVvMW+3MJzJqPCYCgWvTwnEFhYSNx6pK:gG5VvMW+kq02np+
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2