General
-
Target
JaffaCakes118_0249c6bce81caad3de8ddf7c89c85249
-
Size
309KB
-
Sample
241231-ds4hma1qcn
-
MD5
0249c6bce81caad3de8ddf7c89c85249
-
SHA1
5b9764be0046d352596f24e4ad45ed29997dcdf2
-
SHA256
b9142477296411fdde93ef7e30abdf42d7c7a080121de0b54b419c3e377d9836
-
SHA512
6ce8c9bbe70a8934e0bbb3c9d60cc0bd31b3f8314a03483cd1c269df77371d1ae178096d9fb6b88e638926b6b5b8ebe0337e80ad150c4ec446488a1b75d8d84f
-
SSDEEP
6144:iBhCUNLH/FLnaSvGN2gCyYm4B5v2rJy9ghOTknMFQoLCgTxRu+3i:qfNThjeN/CM4BErJw8MrLCgT9i
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0249c6bce81caad3de8ddf7c89c85249.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.18.0 - Trial version
remote
ieplore.zapto.org:81
E6060NT1UNC760
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Win32
-
install_file
hfkcu.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
2168973abc
-
regkey_hkcu
Services
-
regkey_hklm
Services
Targets
-
-
Target
JaffaCakes118_0249c6bce81caad3de8ddf7c89c85249
-
Size
309KB
-
MD5
0249c6bce81caad3de8ddf7c89c85249
-
SHA1
5b9764be0046d352596f24e4ad45ed29997dcdf2
-
SHA256
b9142477296411fdde93ef7e30abdf42d7c7a080121de0b54b419c3e377d9836
-
SHA512
6ce8c9bbe70a8934e0bbb3c9d60cc0bd31b3f8314a03483cd1c269df77371d1ae178096d9fb6b88e638926b6b5b8ebe0337e80ad150c4ec446488a1b75d8d84f
-
SSDEEP
6144:iBhCUNLH/FLnaSvGN2gCyYm4B5v2rJy9ghOTknMFQoLCgTxRu+3i:qfNThjeN/CM4BErJw8MrLCgT9i
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2