General
-
Target
2acc60dbb4fb386b692326a1a028c29b_JaffaCakes118
-
Size
338KB
-
Sample
241009-e2zrga1blg
-
MD5
2acc60dbb4fb386b692326a1a028c29b
-
SHA1
028fe705db2340e8d0cd2665ba6120941df86b62
-
SHA256
e27f86c9cd68275ff9c9f747ce3fac7d825be5a4aaa270b1e0dfa93da753cad2
-
SHA512
54b69c425ccc56299627cfd3c507eae8f92fd38507704f838d99f937574e8394f0ba1329a6f761772e5cb0b5512a66e523c26bfe33e9170b9d3c31d97b1d1615
-
SSDEEP
6144:ZPBrzzzzzzzzt66Zt/o8439hY4QhcE3PVBVdAM9hjvEW9q0B374SO9Fn0Ka7sSNd:7zzzzzzzzt66Zt/r7CE3PVLHjvzVB3rH
Static task
static1
Behavioral task
behavioral1
Sample
2acc60dbb4fb386b692326a1a028c29b_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
test
testgroundcha.zapto.org:100
AINPIW1MDQ4C21
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Extracted
latentbot
testgroundcha.zapto.org
Targets
-
-
Target
2acc60dbb4fb386b692326a1a028c29b_JaffaCakes118
-
Size
338KB
-
MD5
2acc60dbb4fb386b692326a1a028c29b
-
SHA1
028fe705db2340e8d0cd2665ba6120941df86b62
-
SHA256
e27f86c9cd68275ff9c9f747ce3fac7d825be5a4aaa270b1e0dfa93da753cad2
-
SHA512
54b69c425ccc56299627cfd3c507eae8f92fd38507704f838d99f937574e8394f0ba1329a6f761772e5cb0b5512a66e523c26bfe33e9170b9d3c31d97b1d1615
-
SSDEEP
6144:ZPBrzzzzzzzzt66Zt/o8439hY4QhcE3PVBVdAM9hjvEW9q0B374SO9Fn0Ka7sSNd:7zzzzzzzzt66Zt/r7CE3PVLHjvzVB3rH
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-