Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_852598c087b93a500d4b2b7df1a06a17
-
Size
380KB
-
Sample
250321-3jlznaszgy
-
MD5
852598c087b93a500d4b2b7df1a06a17
-
SHA1
3b2d01c381fb4a7097f4b7e354194f2d46644cb4
-
SHA256
a5a60f924ee701ce356037a1a6ee84d71c20e4112c297d57511cec87c7734674
-
SHA512
949954308ca224d0d7f779669e9035372a167470fb57069870ccfb0d9155ed1c265fcd8d19fea7d1f4d3c7b58a5cf6f3f9b1f72c192c04fce1f772c49ee77c79
-
SSDEEP
6144:bF3z7Ls3CwM+kBDl7VXKaH2AoQZbGQ2MG+33zO3kYgOf/DrF7IRqo2SuCToWUG+t:5jSCwM+yJ7p1/LxzO3kWrF73KUoz
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_852598c087b93a500d4b2b7df1a06a17.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_852598c087b93a500d4b2b7df1a06a17.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
cybergate
v1.07.5
cybergate
panteravt.no-ip.org:82
E3B65X37H270YP
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./My Documents/
-
ftp_interval
15
-
ftp_password
pantera
-
ftp_port
21
-
ftp_server
ftp.drivehq.com
-
ftp_username
panteravt
-
injected_process
explorer.exe
-
install_dir
Winlog
-
install_file
cybergate.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
admin
Targets
-
-
Target
JaffaCakes118_852598c087b93a500d4b2b7df1a06a17
-
Size
380KB
-
MD5
852598c087b93a500d4b2b7df1a06a17
-
SHA1
3b2d01c381fb4a7097f4b7e354194f2d46644cb4
-
SHA256
a5a60f924ee701ce356037a1a6ee84d71c20e4112c297d57511cec87c7734674
-
SHA512
949954308ca224d0d7f779669e9035372a167470fb57069870ccfb0d9155ed1c265fcd8d19fea7d1f4d3c7b58a5cf6f3f9b1f72c192c04fce1f772c49ee77c79
-
SSDEEP
6144:bF3z7Ls3CwM+kBDl7VXKaH2AoQZbGQ2MG+33zO3kYgOf/DrF7IRqo2SuCToWUG+t:5jSCwM+yJ7p1/LxzO3kWrF73KUoz
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1