General
-
Target
JaffaCakes118_8a14769ad39409917958c506e714f455
-
Size
769KB
-
Sample
250117-nf2hlswkaq
-
MD5
8a14769ad39409917958c506e714f455
-
SHA1
5ad0e8d7ea31fe6b9f0d3893d98a30af05765325
-
SHA256
4c080fed8e53442ac5d0ecafcaea4417042ea1a24063fe42aaba6839a5fd4494
-
SHA512
e47cf62b718b8faf34e485930431bb0530e6bfd660365181aab74ca95e4e1aa4afe0c8565cd29868007f3236b1972b3e15fdc3cc79a4f792d1de8b6396526334
-
SSDEEP
12288:0IxNY/z2emhxverfD+ncIIpJzf1Ev0JgdnZsstNdIgKKM45:0IxNUyjv0+n3EJzvJgdnZqR0
Behavioral task
behavioral1
Sample
JaffaCakes118_8a14769ad39409917958c506e714f455.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
gded
kees-me.dyndns.biz:999
kees-me.no-ip.org:999
127.0.0.1:999
I55238AAG88GE6
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
cystem
-
install_file
r.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123abc
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_8a14769ad39409917958c506e714f455
-
Size
769KB
-
MD5
8a14769ad39409917958c506e714f455
-
SHA1
5ad0e8d7ea31fe6b9f0d3893d98a30af05765325
-
SHA256
4c080fed8e53442ac5d0ecafcaea4417042ea1a24063fe42aaba6839a5fd4494
-
SHA512
e47cf62b718b8faf34e485930431bb0530e6bfd660365181aab74ca95e4e1aa4afe0c8565cd29868007f3236b1972b3e15fdc3cc79a4f792d1de8b6396526334
-
SSDEEP
12288:0IxNY/z2emhxverfD+ncIIpJzf1Ev0JgdnZsstNdIgKKM45:0IxNUyjv0+n3EJzvJgdnZqR0
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1