General
-
Target
d8bc5bf233b8e13bf99eb500b0741b8e_JaffaCakes118
-
Size
349KB
-
Sample
241209-kepkwawrgm
-
MD5
d8bc5bf233b8e13bf99eb500b0741b8e
-
SHA1
87b0e1128d0bbba67514798606b6b077a7c4d069
-
SHA256
f74eab90595832561fd571be310135f835c4953e1c23ffac8fcbf6241ac1bde5
-
SHA512
d7d745bea32da8fba7282da9d83086d5c7ea050d285224b96e2d4086480d1bbcf56ae51eef5702355beb2b24d2b74e6c4ca5defaf398ef3c95c30ac26a803176
-
SSDEEP
6144:fNLJzawntzvv8nI/rtd89UVGDQ1mkQ/TgXJsFfLAf2E5DNmSfYT67GctE0cG0hCL:fNLJzZzvvY7UVVQbTmJsFEK2YThctfc9
Static task
static1
Behavioral task
behavioral1
Sample
d8bc5bf233b8e13bf99eb500b0741b8e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d8bc5bf233b8e13bf99eb500b0741b8e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.05.1
remote
gangstaboy33.no-ip.biz:7777
HI4EXG43O5BSAJ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
heheyo
Targets
-
-
Target
d8bc5bf233b8e13bf99eb500b0741b8e_JaffaCakes118
-
Size
349KB
-
MD5
d8bc5bf233b8e13bf99eb500b0741b8e
-
SHA1
87b0e1128d0bbba67514798606b6b077a7c4d069
-
SHA256
f74eab90595832561fd571be310135f835c4953e1c23ffac8fcbf6241ac1bde5
-
SHA512
d7d745bea32da8fba7282da9d83086d5c7ea050d285224b96e2d4086480d1bbcf56ae51eef5702355beb2b24d2b74e6c4ca5defaf398ef3c95c30ac26a803176
-
SSDEEP
6144:fNLJzawntzvv8nI/rtd89UVGDQ1mkQ/TgXJsFfLAf2E5DNmSfYT67GctE0cG0hCL:fNLJzZzvvY7UVVQbTmJsFEK2YThctfc9
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4