General
-
Target
f83b940f77a2e62a320d5e3f0f3422a7_JaffaCakes118
-
Size
702KB
-
Sample
241216-krmxtasret
-
MD5
f83b940f77a2e62a320d5e3f0f3422a7
-
SHA1
bb0bea7133b26e6d89ab5c298247c472e646f532
-
SHA256
e97c679da711f3e1cf7e2290d642b9fe6685039e4017e7c9c893f3ba83bcead0
-
SHA512
bd8f03fb74c390b01d911020c02feb0e7a0b23c06bdf0cf5a3c51289126af327d3ea9c96fcc9a4ed928d8082c7f49a95769b75f5d0f611c10e3cb1742b7abec9
-
SSDEEP
12288:Z6wVuRiO7nH/HEIbNzuNhZ13j/mwdW5UswWB7/oG4hafOHRgeKgxv3t:QwwcqH/HDbNKZ13j/szZpFEKgxv3t
Static task
static1
Behavioral task
behavioral1
Sample
f83b940f77a2e62a320d5e3f0f3422a7_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.02.0
spassr
cybergatefuck.dyndns.org:60423
B21100I81ED2XO
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
win32Gl
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123
Targets
-
-
Target
f83b940f77a2e62a320d5e3f0f3422a7_JaffaCakes118
-
Size
702KB
-
MD5
f83b940f77a2e62a320d5e3f0f3422a7
-
SHA1
bb0bea7133b26e6d89ab5c298247c472e646f532
-
SHA256
e97c679da711f3e1cf7e2290d642b9fe6685039e4017e7c9c893f3ba83bcead0
-
SHA512
bd8f03fb74c390b01d911020c02feb0e7a0b23c06bdf0cf5a3c51289126af327d3ea9c96fcc9a4ed928d8082c7f49a95769b75f5d0f611c10e3cb1742b7abec9
-
SSDEEP
12288:Z6wVuRiO7nH/HEIbNzuNhZ13j/mwdW5UswWB7/oG4hafOHRgeKgxv3t:QwwcqH/HDbNKZ13j/szZpFEKgxv3t
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1