General
-
Target
0567784881ce89353fc5888256ffcbf2_JaffaCakes118
-
Size
289KB
-
Sample
241001-l7xbvsxhre
-
MD5
0567784881ce89353fc5888256ffcbf2
-
SHA1
c0af9ad422359eb0dc60145d44ade242496d6948
-
SHA256
a7f57c0b4613c88e1bfec9fc578cc4dbe958f647a6514e966fbb9ddbb4c360f5
-
SHA512
7dcdb845e17e9b79ec234f053bcc67c4b340770ed2ecc3886b2bd17adea15061da1f3eb679565b035ea976a29c800ffe1b42fcf7ee992ac088a71b529af5acc7
-
SSDEEP
6144:wHp1dmlqdhdBCkWYxuukV1pjSKSNVkq/MVJbY:wJ1dpTBda7GLRMTbY
Behavioral task
behavioral1
Sample
0567784881ce89353fc5888256ffcbf2_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
remote
127.0.0.1:81
7Y27Y1014I1HPM
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123
Targets
-
-
Target
0567784881ce89353fc5888256ffcbf2_JaffaCakes118
-
Size
289KB
-
MD5
0567784881ce89353fc5888256ffcbf2
-
SHA1
c0af9ad422359eb0dc60145d44ade242496d6948
-
SHA256
a7f57c0b4613c88e1bfec9fc578cc4dbe958f647a6514e966fbb9ddbb4c360f5
-
SHA512
7dcdb845e17e9b79ec234f053bcc67c4b340770ed2ecc3886b2bd17adea15061da1f3eb679565b035ea976a29c800ffe1b42fcf7ee992ac088a71b529af5acc7
-
SSDEEP
6144:wHp1dmlqdhdBCkWYxuukV1pjSKSNVkq/MVJbY:wJ1dpTBda7GLRMTbY
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1