General
-
Target
b2456231a630d03b845c1ae95ac4b861_JaffaCakes118
-
Size
1.3MB
-
Sample
241129-s92spatnb1
-
MD5
b2456231a630d03b845c1ae95ac4b861
-
SHA1
ec20ea721ffb06deb651e1e3fb6f676987c95ff0
-
SHA256
a6fcbc4f36f4210f6c77d5476f1763b240321f4710871dbc6367e90474ddf5b8
-
SHA512
50959c67f2cfcce31925cbdb0353640c99d47886c2a2bffb2aef7dc12b367735af309a7ab6b43a48e8aadb2fe8eafac2b030bf07d05785279aff8d40f95ff6f2
-
SSDEEP
12288:eK4lkste2sTcSPYcV9ZZjMaWdxG4O6QS2yI59VRo/MtES6JDC/qYdBFBtoAByVPs:eYFXWM9VRo/MSCNcEPvX9JubX
Static task
static1
Behavioral task
behavioral1
Sample
b2456231a630d03b845c1ae95ac4b861_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
v1.07.5
remote
hanswurst.myftp.org:27050
4EOBL3V337C5TT
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Fraps.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
rivercola123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
b2456231a630d03b845c1ae95ac4b861_JaffaCakes118
-
Size
1.3MB
-
MD5
b2456231a630d03b845c1ae95ac4b861
-
SHA1
ec20ea721ffb06deb651e1e3fb6f676987c95ff0
-
SHA256
a6fcbc4f36f4210f6c77d5476f1763b240321f4710871dbc6367e90474ddf5b8
-
SHA512
50959c67f2cfcce31925cbdb0353640c99d47886c2a2bffb2aef7dc12b367735af309a7ab6b43a48e8aadb2fe8eafac2b030bf07d05785279aff8d40f95ff6f2
-
SSDEEP
12288:eK4lkste2sTcSPYcV9ZZjMaWdxG4O6QS2yI59VRo/MtES6JDC/qYdBFBtoAByVPs:eYFXWM9VRo/MSCNcEPvX9JubX
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2