General
-
Target
e40dfe872aa89f7b2fcbf98143665be3_JaffaCakes118
-
Size
546KB
-
Sample
240916-fga32szdnq
-
MD5
e40dfe872aa89f7b2fcbf98143665be3
-
SHA1
89e842e9c7f50ed68eaa879cb36cc8be72c502e7
-
SHA256
1b058b1f7d408f3b228ab980685dd9d5aaf6568bee558f4e39a3bb8582689abf
-
SHA512
404e0e1759d2c9ffbe75f4e5963a104ac2e53a6d4eabc17db03399e2e0ae99ef536e8258f880341d3f4416cd3cd063903617caabe1f15a70e095ea3388677517
-
SSDEEP
12288:H14e6p8sXejQgNsP9oCMwRhPr+EA70CI6Q0:V4SbjmwED+EA79P
Static task
static1
Behavioral task
behavioral1
Sample
e40dfe872aa89f7b2fcbf98143665be3_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.18.0 - Trial version
cybergate
somethingzz.zapto.org:84
652B0TC0C50JY0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
moliugas
-
regkey_hklm
HKLM
Extracted
latentbot
somethingzz.zapto.org
Targets
-
-
Target
e40dfe872aa89f7b2fcbf98143665be3_JaffaCakes118
-
Size
546KB
-
MD5
e40dfe872aa89f7b2fcbf98143665be3
-
SHA1
89e842e9c7f50ed68eaa879cb36cc8be72c502e7
-
SHA256
1b058b1f7d408f3b228ab980685dd9d5aaf6568bee558f4e39a3bb8582689abf
-
SHA512
404e0e1759d2c9ffbe75f4e5963a104ac2e53a6d4eabc17db03399e2e0ae99ef536e8258f880341d3f4416cd3cd063903617caabe1f15a70e095ea3388677517
-
SSDEEP
12288:H14e6p8sXejQgNsP9oCMwRhPr+EA70CI6Q0:V4SbjmwED+EA79P
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-