General
-
Target
JaffaCakes118_24f09ad60e50a9c682abbbeac5dddeed
-
Size
416KB
-
Sample
250124-ypt51axkcm
-
MD5
24f09ad60e50a9c682abbbeac5dddeed
-
SHA1
729aa3691e0f87059a1b13e7b1063e7760d85dfb
-
SHA256
e3f0346a067350e3aaaa428b1a33902075f2dbba35fff7ed91ec7dbdda239baf
-
SHA512
595ef37863e01eb82f786f85b4416c63ef229bd8104c8c94b85dc7a1e6f891a91391c24d91db818533884b8b453550365036bd510e8a715d40f9a28353d9ec78
-
SSDEEP
12288:vucHb3JMbgmsiPhRgYeJhdFbWYpVP8foM6:vjqrsm1evbjpes
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_24f09ad60e50a9c682abbbeac5dddeed.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.07.5
System
gmailbanner.no-ip.biz:81
2F7322BDHVQ4PV
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
spool.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
kali123
-
regkey_hkcu
Windows Fix
-
regkey_hklm
Windows Fix
Targets
-
-
Target
JaffaCakes118_24f09ad60e50a9c682abbbeac5dddeed
-
Size
416KB
-
MD5
24f09ad60e50a9c682abbbeac5dddeed
-
SHA1
729aa3691e0f87059a1b13e7b1063e7760d85dfb
-
SHA256
e3f0346a067350e3aaaa428b1a33902075f2dbba35fff7ed91ec7dbdda239baf
-
SHA512
595ef37863e01eb82f786f85b4416c63ef229bd8104c8c94b85dc7a1e6f891a91391c24d91db818533884b8b453550365036bd510e8a715d40f9a28353d9ec78
-
SSDEEP
12288:vucHb3JMbgmsiPhRgYeJhdFbWYpVP8foM6:vjqrsm1evbjpes
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2