General
-
Target
JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd
-
Size
854KB
-
Sample
250118-m4czgs1ncx
-
MD5
a7f4b80020aeb7b9520a14d71db373fd
-
SHA1
66d1f6d50510940ba6f3e16360df402300db2d88
-
SHA256
7756fa478a5463d5abca6d3989c2c4251446803dc4ed1b0a9f69e60358f966cb
-
SHA512
4e5b2a2ca18e3800c7681f80639955a017c3312e7f612880007f72e8603b24bbaa6fb4df5ecbc7503227ca99a795915dc8a89e141f2e87716e2a202f56dccdea
-
SSDEEP
12288:ljeMYfumEQVCZ+03R7LpjR1qGd+N0+j6HurTik77nGJQWMpnXxcq029iA:lhNPj1pjR1qGN+j6G+OSe5pnXxb029
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.05.1
dreitovics
gangstaboy33.no-ip.biz:7777
H3154OFE1J1K0T
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
heheyo
Targets
-
-
Target
JaffaCakes118_a7f4b80020aeb7b9520a14d71db373fd
-
Size
854KB
-
MD5
a7f4b80020aeb7b9520a14d71db373fd
-
SHA1
66d1f6d50510940ba6f3e16360df402300db2d88
-
SHA256
7756fa478a5463d5abca6d3989c2c4251446803dc4ed1b0a9f69e60358f966cb
-
SHA512
4e5b2a2ca18e3800c7681f80639955a017c3312e7f612880007f72e8603b24bbaa6fb4df5ecbc7503227ca99a795915dc8a89e141f2e87716e2a202f56dccdea
-
SSDEEP
12288:ljeMYfumEQVCZ+03R7LpjR1qGd+N0+j6HurTik77nGJQWMpnXxcq029iA:lhNPj1pjR1qGN+j6G+OSe5pnXxb029
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4