General
-
Target
dea14688f7b55c9cae6030acc8df6e59_JaffaCakes118
-
Size
669KB
-
Sample
241210-1n6thswjej
-
MD5
dea14688f7b55c9cae6030acc8df6e59
-
SHA1
d33ad3e2624cd3c6e525695ca77d990f98041fad
-
SHA256
1536b9200f11192f4981b7f7dfea0eb0cae873afa9081740ae85af9e18ccc3b5
-
SHA512
3df3687c3a2cec49459d80d8536251f1457181d6b7c10aec6114d158ab69f719815052864f84e08bf591866e95f3f03610f9b67c398929583d4a0ee96bafbd91
-
SSDEEP
12288:kzYwKuEYUhoMO+xxmYrkwDDV69CMuo+/OACjlqXGAkjyEMFYDJVacPN:MsZYUhoM/LmKoAvWACjgXZ8DDH7N
Behavioral task
behavioral1
Sample
dea14688f7b55c9cae6030acc8df6e59_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.04.8
MyTarget
jenss.no-ip.biz:6545
127.0.0.1:6545
192.168.2.2:6545
4UOJX5667P52W1
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
dllhost.exe
-
install_dir
Support
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Out Of Memory
-
message_box_title
Error
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
Windows Update
Targets
-
-
Target
dea14688f7b55c9cae6030acc8df6e59_JaffaCakes118
-
Size
669KB
-
MD5
dea14688f7b55c9cae6030acc8df6e59
-
SHA1
d33ad3e2624cd3c6e525695ca77d990f98041fad
-
SHA256
1536b9200f11192f4981b7f7dfea0eb0cae873afa9081740ae85af9e18ccc3b5
-
SHA512
3df3687c3a2cec49459d80d8536251f1457181d6b7c10aec6114d158ab69f719815052864f84e08bf591866e95f3f03610f9b67c398929583d4a0ee96bafbd91
-
SSDEEP
12288:kzYwKuEYUhoMO+xxmYrkwDDV69CMuo+/OACjlqXGAkjyEMFYDJVacPN:MsZYUhoM/LmKoAvWACjgXZ8DDH7N
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2