General
-
Target
d8d26545ddfc3580639399ce2c499873_JaffaCakes118
-
Size
354KB
-
Sample
241209-kvafwsxmcq
-
MD5
d8d26545ddfc3580639399ce2c499873
-
SHA1
b53c9cf82ad10f813ff652d6bcb60aa03f751968
-
SHA256
d86e005f0d0cdf6f00a922f898b52b8eaef841436babc36f82c27ea8461eaf55
-
SHA512
f471ce7af57f3160d18c5b857a872665e5ca42a7bb2c70d1ac2de8c6dad23cb5b7dc41b97908d0831a99c81a736a9e3e1a90a9d3410d3393f88945c701b2459e
-
SSDEEP
6144:Hi1TzaLuI5v4TZuvk6tua/R8PyQdK/lRPCxAi8IAon9w8T:C1TzaLzK81BRRQs/lR28IfvT
Static task
static1
Behavioral task
behavioral1
Sample
d8d26545ddfc3580639399ce2c499873_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
cybergate
v1.02.1
Lammer
127.0.0.1:81
h1n1hack.no-ip.info:81
h1n1hack.no-ip.info:12345
h1n1hack.no-ip.info:2000
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Pluguin.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
kek
-
regkey_hkcu
Avirnt
-
regkey_hklm
Avgnt
Targets
-
-
Target
d8d26545ddfc3580639399ce2c499873_JaffaCakes118
-
Size
354KB
-
MD5
d8d26545ddfc3580639399ce2c499873
-
SHA1
b53c9cf82ad10f813ff652d6bcb60aa03f751968
-
SHA256
d86e005f0d0cdf6f00a922f898b52b8eaef841436babc36f82c27ea8461eaf55
-
SHA512
f471ce7af57f3160d18c5b857a872665e5ca42a7bb2c70d1ac2de8c6dad23cb5b7dc41b97908d0831a99c81a736a9e3e1a90a9d3410d3393f88945c701b2459e
-
SSDEEP
6144:Hi1TzaLuI5v4TZuvk6tua/R8PyQdK/lRPCxAi8IAon9w8T:C1TzaLzK81BRRQs/lR28IfvT
-
Cybergate family
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-