General
-
Target
0e75bd63a8758981b03cc6436339e2ae_JaffaCakes118
-
Size
1.0MB
-
Sample
240625-r32zfawcmf
-
MD5
0e75bd63a8758981b03cc6436339e2ae
-
SHA1
e567e3645721296c23159f3b42258be5611ca729
-
SHA256
3df4065f1402791df276957eee37edd2eddce79df67aeb274d0da426b01e6cde
-
SHA512
6647e0fd3c7b83b5449841070b246cd3ed6c40a792863ec43e2d1510497fda8b1c6a7b686a6e3dc6567e067d495498a376c49faf2f2f78d1101af81911451362
-
SSDEEP
24576:1pqW/xLv1cRnxlFCwoOUgYAzopXFYFAh:nqW/1v6xxl5ocSF
Static task
static1
Behavioral task
behavioral1
Sample
0e75bd63a8758981b03cc6436339e2ae_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
cybergate
v1.12.0
GLA0402
tranoglaros13.zapto.org:3780
192.168.0.10:110
DVUP5XSFL574A7
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
27042704
Extracted
latentbot
tranoglaros13.zapto.org
Targets
-
-
Target
0e75bd63a8758981b03cc6436339e2ae_JaffaCakes118
-
Size
1.0MB
-
MD5
0e75bd63a8758981b03cc6436339e2ae
-
SHA1
e567e3645721296c23159f3b42258be5611ca729
-
SHA256
3df4065f1402791df276957eee37edd2eddce79df67aeb274d0da426b01e6cde
-
SHA512
6647e0fd3c7b83b5449841070b246cd3ed6c40a792863ec43e2d1510497fda8b1c6a7b686a6e3dc6567e067d495498a376c49faf2f2f78d1101af81911451362
-
SSDEEP
24576:1pqW/xLv1cRnxlFCwoOUgYAzopXFYFAh:nqW/1v6xxl5ocSF
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-