General
-
Target
JaffaCakes118_91c5a5ab4901554c66b277b7647e0273
-
Size
260KB
-
Sample
250329-w6kxjssr18
-
MD5
91c5a5ab4901554c66b277b7647e0273
-
SHA1
187f9976c13e483b13b3dbb59d0ffa159bd3afe0
-
SHA256
9aa79b6873c18b69f3643a3f0d8ce328d94daf974cc6b2c2950be7ca49a9865b
-
SHA512
dc0c60d5f6d1463754cc8906904e51fe32af3c9bd1be581b0ff813438a5afbba06c20d29c9bf8b3d5593ebce560aa56c521dd1d2ed3fe4ced00426df96b81be4
-
SSDEEP
6144:pkkF3ap0uGtU47/2yN7W1JX6pIk6gHZ6Ikyq3pSI:ukF3abGK49Ny1JX6pD6gYhyqn
Behavioral task
behavioral1
Sample
JaffaCakes118_91c5a5ab4901554c66b277b7647e0273.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
TRUE
ÝØðÕÞÎÝÎÅý¼¼ûÙÈìÎÓßýØØÎÙÏϼ¼êÕÎÈÉÝÐìÎÓÈÙßȼ¼êÕÎÈÉÝÐýÐÐÓß¼¼êÕÎÈÉÝÐúÎÙÙ¼¼¼ùÄÕÈìÎÓßÙÏϼ¼¼ðÏÝÿÐÓÏÙ¼¼ÿÎÅÌÈéÒÌÎÓÈÙßÈøÝÈݼ¼ÿÓèÝÏ×ñÙÑúÎÙÙ¼¼¼ïÅÏúÎÙÙïÈÎÕÒÛ¼¼¼ìïÈÓÎÙÿÎÙÝÈÙõÒÏÈÝÒßÙ¼¼îÝÏùÒÉÑùÒÈÎÕÙÏý¼¼¼ïôûÙÈïÌÙßÕÝÐúÓÐØÙÎìÝÈÔý¼¼¼èÓýÏßÕÕ¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼¼-11CF-AAA5-00401C6XX500}
HKLM
HKCU
FALSE
16
0
CyberGate
Remote Administration anywhere in the world.
TRUE
ftp.server.com
./logs/
ftp_user
ª÷Öº+Þ
21
30
-
enable_keylogger
false
-
enable_message_box
false
-
install_dir
TRUE
-
install_file
TRUE
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
TRUE
-
message_box_title
TRUE
-
password
TRUE
-
regkey_hkcu
TRUE
-
regkey_hklm
TRUE
Extracted
cybergate
v1.02.0
test
cybersimple.no-ip.biz:82
CyberGate1
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
csrss.exe
-
install_dir
install
-
install_file
INIURIA 1.7.9 CRACKEDexe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
test123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_91c5a5ab4901554c66b277b7647e0273
-
Size
260KB
-
MD5
91c5a5ab4901554c66b277b7647e0273
-
SHA1
187f9976c13e483b13b3dbb59d0ffa159bd3afe0
-
SHA256
9aa79b6873c18b69f3643a3f0d8ce328d94daf974cc6b2c2950be7ca49a9865b
-
SHA512
dc0c60d5f6d1463754cc8906904e51fe32af3c9bd1be581b0ff813438a5afbba06c20d29c9bf8b3d5593ebce560aa56c521dd1d2ed3fe4ced00426df96b81be4
-
SSDEEP
6144:pkkF3ap0uGtU47/2yN7W1JX6pIk6gHZ6Ikyq3pSI:ukF3abGK49Ny1JX6pD6gYhyqn
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2