General
-
Target
JaffaCakes118_0b2f346367c8ae13d5f3eb2431f293ca
-
Size
365KB
-
Sample
250122-hbychatldp
-
MD5
0b2f346367c8ae13d5f3eb2431f293ca
-
SHA1
2710c5f241eb7a30b20c8390122dafb6b6f9523c
-
SHA256
98877addf206de59e375a2c09ccebcdf5d3610b87fa7d4a6b0a5acbd5c39dec6
-
SHA512
1642906a00ce0140122074a0811c39961a09398f9a67ce6a27f0de6e51099536e3af986b06c12bd525fe4a1dc529dbdbe3e9665bb31772a1b053a065d9e300de
-
SSDEEP
6144:k7sdufcNtrb2elWf/DTu+CMu3Bc2lrfl5Slrw33Z7cepVP2+aqZciYjtpOGepSmp:DRNR2eleDT/CMiBflrfl5Slr6321qZca
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0b2f346367c8ae13d5f3eb2431f293ca.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
jahrawe
jahrawe2nd.no-ip.biz:3309
jahrawe
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
windows
-
install_file
win.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please try again later.
-
message_box_title
Error
-
password
123
-
regkey_hkcu
pliv
-
regkey_hklm
polc
Targets
-
-
Target
JaffaCakes118_0b2f346367c8ae13d5f3eb2431f293ca
-
Size
365KB
-
MD5
0b2f346367c8ae13d5f3eb2431f293ca
-
SHA1
2710c5f241eb7a30b20c8390122dafb6b6f9523c
-
SHA256
98877addf206de59e375a2c09ccebcdf5d3610b87fa7d4a6b0a5acbd5c39dec6
-
SHA512
1642906a00ce0140122074a0811c39961a09398f9a67ce6a27f0de6e51099536e3af986b06c12bd525fe4a1dc529dbdbe3e9665bb31772a1b053a065d9e300de
-
SSDEEP
6144:k7sdufcNtrb2elWf/DTu+CMu3Bc2lrfl5Slrw33Z7cepVP2+aqZciYjtpOGepSmp:DRNR2eleDT/CMiBflrfl5Slr6321qZca
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1