General
-
Target
JaffaCakes118_00c5142d037a7471322203edcb6cf5d1
-
Size
548KB
-
Sample
250120-3ydxlawkdz
-
MD5
00c5142d037a7471322203edcb6cf5d1
-
SHA1
d0e33052de88ba67229e8c769124a0b82729c804
-
SHA256
3937c7b49488bfbccc2815cb6780159f82c4f493441b5dee4cb19278eb01c5d7
-
SHA512
b2b95376ee80658ddd199daa4551def1f9f25bebb4db64bceb0b2cff8a605befd0f48f7cdda866575cbe42e7da64e6ae4c1e6f4e92857fa479510683d4ba3b9e
-
SSDEEP
12288:aEWNeIASKMEHrNAgxoBfOReGV4S5tAJI93HqzW:aEW3/3ELCgxskeJ4AcmW
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_00c5142d037a7471322203edcb6cf5d1.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
MM-1128
finders.hopto.org:426
2E38RE677OBUVW
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Google Update
-
install_file
taskmgr.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Error - Application not supported on this operating system
-
message_box_title
Model Placement Application
-
password
knarf0909
-
regkey_hkcu
Google Update
-
regkey_hklm
Google Update
Targets
-
-
Target
JaffaCakes118_00c5142d037a7471322203edcb6cf5d1
-
Size
548KB
-
MD5
00c5142d037a7471322203edcb6cf5d1
-
SHA1
d0e33052de88ba67229e8c769124a0b82729c804
-
SHA256
3937c7b49488bfbccc2815cb6780159f82c4f493441b5dee4cb19278eb01c5d7
-
SHA512
b2b95376ee80658ddd199daa4551def1f9f25bebb4db64bceb0b2cff8a605befd0f48f7cdda866575cbe42e7da64e6ae4c1e6f4e92857fa479510683d4ba3b9e
-
SSDEEP
12288:aEWNeIASKMEHrNAgxoBfOReGV4S5tAJI93HqzW:aEW3/3ELCgxskeJ4AcmW
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-