General
-
Target
0de24466a5b1984f5728658c664df4a8_JaffaCakes118
-
Size
322KB
-
Sample
241003-ew6mtsxgre
-
MD5
0de24466a5b1984f5728658c664df4a8
-
SHA1
1119de1f624fcda7375b3bab451cd57cf45da2a7
-
SHA256
e9ebab9a42077f8d1564eb832fb9f0ba9119ca6008fad3159dc580964087a238
-
SHA512
07b916cc17257f75e7e00b7ac10e2b2650b07e0094a903d7a6192569cc9068518f61c04f4769bb6a42a692320bdce4d3f98cbf5e69288bbecbf7a4cb046d95bf
-
SSDEEP
6144:ClKCb8KgFXi7aVPhsHMwq2VWU/5kWjRJHbBYseP4fJpS9snJ4rbDMf1u:JCbDgFXrvwq2VWS9YuJp5n+DOu
Static task
static1
Behavioral task
behavioral1
Sample
0de24466a5b1984f5728658c664df4a8_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
524
81.64.255.138:524
skylabinc.zapto.org:524
56Y6UBJB6L76BQ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
lolilol
-
regkey_hkcu
svchost
-
regkey_hklm
svchost
Targets
-
-
Target
0de24466a5b1984f5728658c664df4a8_JaffaCakes118
-
Size
322KB
-
MD5
0de24466a5b1984f5728658c664df4a8
-
SHA1
1119de1f624fcda7375b3bab451cd57cf45da2a7
-
SHA256
e9ebab9a42077f8d1564eb832fb9f0ba9119ca6008fad3159dc580964087a238
-
SHA512
07b916cc17257f75e7e00b7ac10e2b2650b07e0094a903d7a6192569cc9068518f61c04f4769bb6a42a692320bdce4d3f98cbf5e69288bbecbf7a4cb046d95bf
-
SSDEEP
6144:ClKCb8KgFXi7aVPhsHMwq2VWU/5kWjRJHbBYseP4fJpS9snJ4rbDMf1u:JCbDgFXrvwq2VWS9YuJp5n+DOu
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2