General
-
Target
f4811ad4fe287118e101c94bb1684ca2_JaffaCakes118
-
Size
548KB
-
Sample
241215-sazt2sxnc1
-
MD5
f4811ad4fe287118e101c94bb1684ca2
-
SHA1
ab0e1ea9c4cee2af67765d8d091077915a1d1227
-
SHA256
7df8e50eedd280499aa3ac256252a3cb799b1f82dc38d4df618bb2195305fc71
-
SHA512
10de22573d3bc95b31c195858ff51ed08343e4b43659f6bc26a0915f769f80c2bb1971a29b25d518174029f223b4b0229ac1bfff504d46651a61ff78d46cc620
-
SSDEEP
12288:AFBRszVMMbJgeS4dIhSDpuwnhXWQA81BycP8HJyk9ZxNQT6:0szVSej7BnNWQP1cnHJykfxNQ
Static task
static1
Behavioral task
behavioral1
Sample
f4811ad4fe287118e101c94bb1684ca2_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f4811ad4fe287118e101c94bb1684ca2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.07.5
remote
chonchon.no-ip.org:22
HLXGSDG76WQ388
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Sys
-
install_file
ping.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
svchost
-
regkey_hklm
svchost
Targets
-
-
Target
f4811ad4fe287118e101c94bb1684ca2_JaffaCakes118
-
Size
548KB
-
MD5
f4811ad4fe287118e101c94bb1684ca2
-
SHA1
ab0e1ea9c4cee2af67765d8d091077915a1d1227
-
SHA256
7df8e50eedd280499aa3ac256252a3cb799b1f82dc38d4df618bb2195305fc71
-
SHA512
10de22573d3bc95b31c195858ff51ed08343e4b43659f6bc26a0915f769f80c2bb1971a29b25d518174029f223b4b0229ac1bfff504d46651a61ff78d46cc620
-
SSDEEP
12288:AFBRszVMMbJgeS4dIhSDpuwnhXWQA81BycP8HJyk9ZxNQT6:0szVSej7BnNWQP1cnHJykfxNQ
-
Cybergate family
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1