General
-
Target
JaffaCakes118_6e1a55707e4a9d77f92aa4196e1ec3bf
-
Size
1.3MB
-
Sample
250103-vh9ekatnez
-
MD5
6e1a55707e4a9d77f92aa4196e1ec3bf
-
SHA1
57fe7bbeae94ae50e75f8219fd9f83352a58ea6c
-
SHA256
711c41811aba0bf2f9b962ff2759e17c4c071543a85a406a0dbd18bb7c2fb6a7
-
SHA512
64b9dbd95266314b193e900b720ed1544b444c5775568cab85e6c01918c6db28d229da1a6cd1f8f27467dbeb2c99e7f564ae51f75e8c450043b52357a3f85ae7
-
SSDEEP
3072:ObncMd0cif8p9ZyzMfxK/NLgVVCbMauSobRLz6sBWbqbyR4C9sGCX9XiwiQhPWhE:gO5WI+YH8wc1bntl0nQMPE
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e1a55707e4a9d77f92aa4196e1ec3bf.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
2.6
a1
127.0.0.1:288
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
w
-
install_file
win.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please try again later.
-
message_box_title
Error
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_6e1a55707e4a9d77f92aa4196e1ec3bf
-
Size
1.3MB
-
MD5
6e1a55707e4a9d77f92aa4196e1ec3bf
-
SHA1
57fe7bbeae94ae50e75f8219fd9f83352a58ea6c
-
SHA256
711c41811aba0bf2f9b962ff2759e17c4c071543a85a406a0dbd18bb7c2fb6a7
-
SHA512
64b9dbd95266314b193e900b720ed1544b444c5775568cab85e6c01918c6db28d229da1a6cd1f8f27467dbeb2c99e7f564ae51f75e8c450043b52357a3f85ae7
-
SSDEEP
3072:ObncMd0cif8p9ZyzMfxK/NLgVVCbMauSobRLz6sBWbqbyR4C9sGCX9XiwiQhPWhE:gO5WI+YH8wc1bntl0nQMPE
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2