General
-
Target
bd2fcf41b47415f6c08499b4e79c6574_JaffaCakes118
-
Size
1.3MB
-
Sample
241203-nmn6vsynep
-
MD5
bd2fcf41b47415f6c08499b4e79c6574
-
SHA1
36afc16d6c6e5386fdbf803dabf37685357e0b64
-
SHA256
cb4bd8303aeab1680fb28ddfd9c593e56499a1ddc319e8bc99bcc0a1752a9386
-
SHA512
71d0d8a7997ae34b7459177bf8b4deaf64b5bef6987ddae9e72196144d96acd6e2f91437a37523e4fd1663ea04408ce524e7bba1b86db6691054e9b069e7d6f4
-
SSDEEP
24576:FmsOzXC5qClLz1v0f/Jw8TAR8pi8WTlUU50aC2Q+xVfk:oseCgMS1TzbWTlF032Fz
Static task
static1
Behavioral task
behavioral1
Sample
bd2fcf41b47415f6c08499b4e79c6574_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
Ray
rayowned.no-ip.org:86
U3L4M436785J7H
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
dell
-
install_file
defender.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hklm
HKLM
Extracted
cybergate
v1.07.5
Coucou
darkTr4k4.no-ip.org:86
88.123.44.61:86
752A4HS0CU8AWK
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Targets
-
-
Target
bd2fcf41b47415f6c08499b4e79c6574_JaffaCakes118
-
Size
1.3MB
-
MD5
bd2fcf41b47415f6c08499b4e79c6574
-
SHA1
36afc16d6c6e5386fdbf803dabf37685357e0b64
-
SHA256
cb4bd8303aeab1680fb28ddfd9c593e56499a1ddc319e8bc99bcc0a1752a9386
-
SHA512
71d0d8a7997ae34b7459177bf8b4deaf64b5bef6987ddae9e72196144d96acd6e2f91437a37523e4fd1663ea04408ce524e7bba1b86db6691054e9b069e7d6f4
-
SSDEEP
24576:FmsOzXC5qClLz1v0f/Jw8TAR8pi8WTlUU50aC2Q+xVfk:oseCgMS1TzbWTlF032Fz
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1