General
-
Target
JaffaCakes118_d71d3040fe548d91c57ddc49927ab83f
-
Size
280KB
-
Sample
250120-az15astlhn
-
MD5
d71d3040fe548d91c57ddc49927ab83f
-
SHA1
6d09df70279c72685b024f7031318718f1c9ac91
-
SHA256
113b62f47496644fa7efab855416c4776c602ef0db9cda6518e2aa30dffe27c8
-
SHA512
124880a2daf6104627ddb56905c0d95c16c7d44f9824065f4015849daeab388cc0e6671aa3ac849e794495497335b7e62f18ec940a8da6ade3fb02160a2a59f2
-
SSDEEP
6144:goHsFX9UYekVu6SepOZ89yWB521LTQb+b//8r1:CFX9LekseEZ89NQLTjL/2
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d71d3040fe548d91c57ddc49927ab83f.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
v1.07.5
w_060611
xro.mine.nu:27011
xro.mine.nu:27010
xro.mine.nu:27009
2QF615K6828NPY
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
wnlogon
-
install_file
wnlogon.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Targets
-
-
Target
JaffaCakes118_d71d3040fe548d91c57ddc49927ab83f
-
Size
280KB
-
MD5
d71d3040fe548d91c57ddc49927ab83f
-
SHA1
6d09df70279c72685b024f7031318718f1c9ac91
-
SHA256
113b62f47496644fa7efab855416c4776c602ef0db9cda6518e2aa30dffe27c8
-
SHA512
124880a2daf6104627ddb56905c0d95c16c7d44f9824065f4015849daeab388cc0e6671aa3ac849e794495497335b7e62f18ec940a8da6ade3fb02160a2a59f2
-
SSDEEP
6144:goHsFX9UYekVu6SepOZ89yWB521LTQb+b//8r1:CFX9LekseEZ89NQLTjL/2
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1