General
-
Target
JaffaCakes118_2639af67c040f4aab1b0bd0382a08f69
-
Size
1.2MB
-
Sample
250124-26wa6svmgn
-
MD5
2639af67c040f4aab1b0bd0382a08f69
-
SHA1
d4c933f713cdc93e4f13cf026d8cf347f3720c16
-
SHA256
e096cfca85266ef591278324664645e6b2cc3ec3d8c39d34a44948b5374fefe2
-
SHA512
d1bd1dff309b19cf2fe767fb9f8830588128837f89ada4f05de86e48a86f1c5fafff967668be0a03cf78dd9d266bd34bcca5fccdb924799abe4b3119edfd0577
-
SSDEEP
12288:OnJxyxpdB1c2eYAWUfOiD0xXTSCGAdh/p6dfx8w4HbW/tghl06mdqOZ/u75/xBmm:OJU/JrAWUExDNFHfrwchseW5LpcS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2639af67c040f4aab1b0bd0382a08f69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2639af67c040f4aab1b0bd0382a08f69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.02.0
Games_Pirate
poison.no-ip.biz:1604
04TU06MGVYNFSQ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
csrss.exe
-
install_dir
install
-
install_file
AngryBirds.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
11082007
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_2639af67c040f4aab1b0bd0382a08f69
-
Size
1.2MB
-
MD5
2639af67c040f4aab1b0bd0382a08f69
-
SHA1
d4c933f713cdc93e4f13cf026d8cf347f3720c16
-
SHA256
e096cfca85266ef591278324664645e6b2cc3ec3d8c39d34a44948b5374fefe2
-
SHA512
d1bd1dff309b19cf2fe767fb9f8830588128837f89ada4f05de86e48a86f1c5fafff967668be0a03cf78dd9d266bd34bcca5fccdb924799abe4b3119edfd0577
-
SSDEEP
12288:OnJxyxpdB1c2eYAWUfOiD0xXTSCGAdh/p6dfx8w4HbW/tghl06mdqOZ/u75/xBmm:OJU/JrAWUExDNFHfrwchseW5LpcS
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2