General
-
Target
4a5eb47947f04f9c8479be0879491a0f_JaffaCakes118
-
Size
1.2MB
-
Sample
240715-tdwr8sybmp
-
MD5
4a5eb47947f04f9c8479be0879491a0f
-
SHA1
53656fb0bbebd2f1b766cdddfc9289eed443f821
-
SHA256
295eba38b95f09083f2673594bdcba73985d5b89e41230b9c4761b584a68051f
-
SHA512
166425cac93ee83b7ef90629e60d74a41e1eadeea06c0fffc993c58088b84c4afa6c467fd2c2014d4f19d5384917949809c7832417940823a8ff8f2f0a9167d0
-
SSDEEP
24576:HhqMYdprgqE8sleQy2bkqjZcFMV3bLCHYvn/htX3t3Pf2:HhqDpJE3QOnjZy1HsfBG
Static task
static1
Behavioral task
behavioral1
Sample
4a5eb47947f04f9c8479be0879491a0f_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
cybergate
v1.07.5
itzh4cked
itzh4cked.no-ip.biz:6661
CY4GD3PW1Q0B43
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
test this bitch.exe
-
install_dir
Windows
-
install_file
chrome.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
what459sit512
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
4a5eb47947f04f9c8479be0879491a0f_JaffaCakes118
-
Size
1.2MB
-
MD5
4a5eb47947f04f9c8479be0879491a0f
-
SHA1
53656fb0bbebd2f1b766cdddfc9289eed443f821
-
SHA256
295eba38b95f09083f2673594bdcba73985d5b89e41230b9c4761b584a68051f
-
SHA512
166425cac93ee83b7ef90629e60d74a41e1eadeea06c0fffc993c58088b84c4afa6c467fd2c2014d4f19d5384917949809c7832417940823a8ff8f2f0a9167d0
-
SSDEEP
24576:HhqMYdprgqE8sleQy2bkqjZcFMV3bLCHYvn/htX3t3Pf2:HhqDpJE3QOnjZy1HsfBG
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-