General
-
Target
c5dd4df325b14e58cf851e0bcb617953_JaffaCakes118
-
Size
3.1MB
-
Sample
241205-ewx1pavjbl
-
MD5
c5dd4df325b14e58cf851e0bcb617953
-
SHA1
fc47da7c0c4d7d26f300ac70b44748d47eafe960
-
SHA256
e742a50fc5dc16f9ac7ca253fce897b08ccbb2dcbf579f137d3e6adba61fc7c0
-
SHA512
d6f32e64e5d169823a8f2f7e60f7c6ac24cc274c5ed3eba5767f6150566fb9d0f371c0c6f1167eea70e00333b609883b2d383009bb901962d4b69aa2c9a641c9
-
SSDEEP
49152:OcfSvMffxA9VXP/fCy/uQ5E6POvJ0g2/e6NNhUYZ:O5Effm9xtXZ/Zd
Static task
static1
Behavioral task
behavioral1
Sample
c5dd4df325b14e58cf851e0bcb617953_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
cybergate
v3.4.2.2
Covid 22
ibram.zapto.org:81
U8346417L556YK
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
Notepad.exe
-
install_dir
install
-
install_file
MicroDate.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
TEGames
-
regkey_hklm
EPic
Targets
-
-
Target
c5dd4df325b14e58cf851e0bcb617953_JaffaCakes118
-
Size
3.1MB
-
MD5
c5dd4df325b14e58cf851e0bcb617953
-
SHA1
fc47da7c0c4d7d26f300ac70b44748d47eafe960
-
SHA256
e742a50fc5dc16f9ac7ca253fce897b08ccbb2dcbf579f137d3e6adba61fc7c0
-
SHA512
d6f32e64e5d169823a8f2f7e60f7c6ac24cc274c5ed3eba5767f6150566fb9d0f371c0c6f1167eea70e00333b609883b2d383009bb901962d4b69aa2c9a641c9
-
SSDEEP
49152:OcfSvMffxA9VXP/fCy/uQ5E6POvJ0g2/e6NNhUYZ:O5Effm9xtXZ/Zd
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2