General
-
Target
c9b5779e50b112068d89667ecc0f5cf3_JaffaCakes118
-
Size
424KB
-
Sample
241205-2kre4avrdy
-
MD5
c9b5779e50b112068d89667ecc0f5cf3
-
SHA1
71fccbe957673aa7d843bc9790100da255d41efd
-
SHA256
920a57771487b695c50a0d4e7de03b643aeb1bc9c9665e070dab8a9e4f9a0ed0
-
SHA512
e2f7740382016c47b7389756f42edd3620b1a973cdfa508850879652cf2923aa64f64bc980e52c12d8658831ea257464f1e88daf56832f685842821d0b11bd2d
-
SSDEEP
12288:GBPWmlLrWNwOzlNQoGiDjLsXqKiuPsTnl:GBemlLKyUNQPCuQn
Static task
static1
Behavioral task
behavioral1
Sample
c9b5779e50b112068d89667ecc0f5cf3_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
pub_b85pu
b85pu.effers.com:40123
I711HG47LT74L5
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
iexplorer.exe
-
install_dir
Intel
-
install_file
cfg.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
fiction
-
regkey_hkcu
Intel
Targets
-
-
Target
c9b5779e50b112068d89667ecc0f5cf3_JaffaCakes118
-
Size
424KB
-
MD5
c9b5779e50b112068d89667ecc0f5cf3
-
SHA1
71fccbe957673aa7d843bc9790100da255d41efd
-
SHA256
920a57771487b695c50a0d4e7de03b643aeb1bc9c9665e070dab8a9e4f9a0ed0
-
SHA512
e2f7740382016c47b7389756f42edd3620b1a973cdfa508850879652cf2923aa64f64bc980e52c12d8658831ea257464f1e88daf56832f685842821d0b11bd2d
-
SSDEEP
12288:GBPWmlLrWNwOzlNQoGiDjLsXqKiuPsTnl:GBemlLKyUNQPCuQn
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-