General
-
Target
3f5b64c1dd2c7f13fb148a2b0fbcb918_JaffaCakes118
-
Size
270KB
-
Sample
241013-ml5lsasard
-
MD5
3f5b64c1dd2c7f13fb148a2b0fbcb918
-
SHA1
ed0fb53fdda2310ecb997ebdd513505f0890be92
-
SHA256
e8ed72785502c6c96760a09325045922e0ecf82c5b4aec0539d65a6177c32049
-
SHA512
478466f0c11f8610f008e2b756b84b2d0c2985c33b43d693182b96cf00ffef261c41dfa7ae98ac42c0d8152b070fec07ba6e2d4d8021f37634e5de1f3965e07a
-
SSDEEP
6144:YCMPJJOfer0kmjuMSpE+qwKUNzW15qcxM51Sn:xg7Ofer3zMSpq+zi5qsM51S
Behavioral task
behavioral1
Sample
3f5b64c1dd2c7f13fb148a2b0fbcb918_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
FALSE
ØØÎÙÏϼ¼êÕÎÈÉÝÐìÎÓÈÙßȼ¼êÕÎÈÉÝÐýÐÐÓß¼¼êÕÎÈÉÝÐúÎÙÙ¼¼¼ùÄÕÈìÎÓßÙÏϼ¼¼ðÏÝÿÐÓÏÙ¼¼ÿÎÅÌÈéÒÌÎÓÈÙßÈøÝÈݼ¼óÐÙõÒÕÈÕÝÐÕÆÙ¼¼¼ïÅÏúÎÙÙïÈÎÕÒÛ¼¼¼ìïÈÓÎÙÿÎÙÝÈÙõÒÏÈÝÒßÙ¼¼îÝÏùÒÉÑùÒÈÎÕÙÏý¼¼¼ïôûÙÈïÌÙßÕÝÐúÓÐØÙÎìÝÈÔý¼¼¼èÓýÏßÕÕ¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼6MWK-WS5W-4E8V-KV61R7WG70QO}
HKLM
HKCU
FALSE
16
0
CyberGate
Remote Administration anywhere in the world.
TRUE
ftp.server.com
./logs/
ftp_user
ª÷Öº+Þ
21
30
-
enable_keylogger
false
-
enable_message_box
false
-
install_dir
FALSE
-
install_file
FALSE
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
TRUE
-
message_box_title
TRUE
-
password
FALSE
-
regkey_hkcu
FALSE
-
regkey_hklm
FALSE
Extracted
cybergate
v1.07.5
DODA
abode.sytes.net:82
a6565.zapto.org:88
VXW81NLA008MQE
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
mee
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
to7a
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
3f5b64c1dd2c7f13fb148a2b0fbcb918_JaffaCakes118
-
Size
270KB
-
MD5
3f5b64c1dd2c7f13fb148a2b0fbcb918
-
SHA1
ed0fb53fdda2310ecb997ebdd513505f0890be92
-
SHA256
e8ed72785502c6c96760a09325045922e0ecf82c5b4aec0539d65a6177c32049
-
SHA512
478466f0c11f8610f008e2b756b84b2d0c2985c33b43d693182b96cf00ffef261c41dfa7ae98ac42c0d8152b070fec07ba6e2d4d8021f37634e5de1f3965e07a
-
SSDEEP
6144:YCMPJJOfer0kmjuMSpE+qwKUNzW15qcxM51Sn:xg7Ofer3zMSpq+zi5qsM51S
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2