General
-
Target
JaffaCakes118_7a825b810dabaa892d3ccf016363517f
-
Size
776KB
-
Sample
250104-s8lebayjan
-
MD5
7a825b810dabaa892d3ccf016363517f
-
SHA1
c78c5cfec9bb1a7993e8287ffbab1a497aa9c519
-
SHA256
bc64d904cb10c7c3944d571cc530b9fa86f5871499f3ecb9ed8cc4e2e69ec5eb
-
SHA512
6809ea879899f930f13fc017c03b406e5175f7c4760ed11e2e9563af79543ad2755b631ac9aee5826c1f8488c9ac786ec26de232c0aa6d7016b0f31b3915d229
-
SSDEEP
12288:Slq23yxuljjXVL9NVamrl/8m5Df/Nf/Zp1BdFQ3xN2FT4qXvW5HTbDN+Ot7M:0nhLVtamrS8D3dZp16z2VXvIDNbC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a825b810dabaa892d3ccf016363517f.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
v1.18.0 - Trial version
remote
esam3at.no-ip.biz:258
M1W7AIKJ40CL45
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
ver.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
1234567
Targets
-
-
Target
JaffaCakes118_7a825b810dabaa892d3ccf016363517f
-
Size
776KB
-
MD5
7a825b810dabaa892d3ccf016363517f
-
SHA1
c78c5cfec9bb1a7993e8287ffbab1a497aa9c519
-
SHA256
bc64d904cb10c7c3944d571cc530b9fa86f5871499f3ecb9ed8cc4e2e69ec5eb
-
SHA512
6809ea879899f930f13fc017c03b406e5175f7c4760ed11e2e9563af79543ad2755b631ac9aee5826c1f8488c9ac786ec26de232c0aa6d7016b0f31b3915d229
-
SSDEEP
12288:Slq23yxuljjXVL9NVamrl/8m5Df/Nf/Zp1BdFQ3xN2FT4qXvW5HTbDN+Ot7M:0nhLVtamrS8D3dZp16z2VXvIDNbC
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1