General
-
Target
JaffaCakes118_684886c4bd1bec3afd3b86b0faf20e11
-
Size
404KB
-
Sample
250102-z39naawkg1
-
MD5
684886c4bd1bec3afd3b86b0faf20e11
-
SHA1
3734ead60ffbac97375537ed963079ba3f288899
-
SHA256
daa4400d55f39bcfb90ddcb04707e37b47284c081aafeac4bf8a2a625a9818ae
-
SHA512
d6228f0ecda9d3313689de7df18d3df96124ee4cee532771b63d21dfa9ee152e350efdc129f824e4c24f997cc3f642a8f3c9fd0894bb1a274ccb38ddd606fc0d
-
SSDEEP
12288:nW1Yn7JVriPMhuDzemoi5OGOpxhtDZoFRHn:nqYLrSqu9o/vtd6n
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_684886c4bd1bec3afd3b86b0faf20e11.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.0
remote
esam3at.no-ip.biz:246
NEW
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
NEW
-
install_file
NEW.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
1234567
Targets
-
-
Target
JaffaCakes118_684886c4bd1bec3afd3b86b0faf20e11
-
Size
404KB
-
MD5
684886c4bd1bec3afd3b86b0faf20e11
-
SHA1
3734ead60ffbac97375537ed963079ba3f288899
-
SHA256
daa4400d55f39bcfb90ddcb04707e37b47284c081aafeac4bf8a2a625a9818ae
-
SHA512
d6228f0ecda9d3313689de7df18d3df96124ee4cee532771b63d21dfa9ee152e350efdc129f824e4c24f997cc3f642a8f3c9fd0894bb1a274ccb38ddd606fc0d
-
SSDEEP
12288:nW1Yn7JVriPMhuDzemoi5OGOpxhtDZoFRHn:nqYLrSqu9o/vtd6n
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1