General
-
Target
JaffaCakes118_3d549885a1d619c0db18e0e928416320
-
Size
471KB
-
Sample
250302-c5r5pasjy3
-
MD5
3d549885a1d619c0db18e0e928416320
-
SHA1
558d44184896ecc6f8b8154f8eef100202034890
-
SHA256
58694d6fa9036a479562067f657831f044f758fc028b99106a0eae09852b6a35
-
SHA512
2ee03427c11e5c540b911efc957f81fd6dbbb47c4cae8bea85370d1d1fcc36e14c6db4c0a721c67a87be0b8f3087b176f1aa66b51f6f6585835f6d987c6d387b
-
SSDEEP
12288:Q9F6HhPFeIk//ru+QAj7zjYrYgCUVBd7BL+Q:iF6HhP8Ik3y+YMgVB7iQ
Behavioral task
behavioral1
Sample
JaffaCakes118_3d549885a1d619c0db18e0e928416320.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
navaaal.no-ip.org:80
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Targets
-
-
Target
JaffaCakes118_3d549885a1d619c0db18e0e928416320
-
Size
471KB
-
MD5
3d549885a1d619c0db18e0e928416320
-
SHA1
558d44184896ecc6f8b8154f8eef100202034890
-
SHA256
58694d6fa9036a479562067f657831f044f758fc028b99106a0eae09852b6a35
-
SHA512
2ee03427c11e5c540b911efc957f81fd6dbbb47c4cae8bea85370d1d1fcc36e14c6db4c0a721c67a87be0b8f3087b176f1aa66b51f6f6585835f6d987c6d387b
-
SSDEEP
12288:Q9F6HhPFeIk//ru+QAj7zjYrYgCUVBd7BL+Q:iF6HhP8Ik3y+YMgVB7iQ
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1