General
-
Target
JaffaCakes118_7de0c00ce73b3585506606b5335fc45d
-
Size
615KB
-
Sample
250116-whg6rasndp
-
MD5
7de0c00ce73b3585506606b5335fc45d
-
SHA1
d034ff13ca23f75d325de60109fddff15d7112b0
-
SHA256
1ebce194b9dfc74e164566a5aa7d33d24e7b686279e932d9486d61cb852af1d4
-
SHA512
0d0628755f6e70c5df63933c2013186f0e2541702e2856069b97ab18527657094d298c356722e4603e357712a797fd708f18009f67073e77bb8e8fbc9af85094
-
SSDEEP
12288:YmjWVFwwoXcgxBIzXacdPnpwiItmb0tdAXZIQvi6pjl1VzYKj86sPc:Ymj4+bNCaEPnGNtf7AXZIQi6pjl1pYOT
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7de0c00ce73b3585506606b5335fc45d.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.04.8
?????
eto.no-ip.biz:86
XKV04G2VA11C64
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
dvnet
-
install_file
svchosts.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
dvnet
-
regkey_hklm
dvnet
Targets
-
-
Target
JaffaCakes118_7de0c00ce73b3585506606b5335fc45d
-
Size
615KB
-
MD5
7de0c00ce73b3585506606b5335fc45d
-
SHA1
d034ff13ca23f75d325de60109fddff15d7112b0
-
SHA256
1ebce194b9dfc74e164566a5aa7d33d24e7b686279e932d9486d61cb852af1d4
-
SHA512
0d0628755f6e70c5df63933c2013186f0e2541702e2856069b97ab18527657094d298c356722e4603e357712a797fd708f18009f67073e77bb8e8fbc9af85094
-
SSDEEP
12288:YmjWVFwwoXcgxBIzXacdPnpwiItmb0tdAXZIQvi6pjl1VzYKj86sPc:Ymj4+bNCaEPnGNtf7AXZIQi6pjl1pYOT
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2