General
-
Target
e01e6172da36d46a3e3f55f28a4e09fd_JaffaCakes118
-
Size
1.3MB
-
Sample
241211-gfk3aszjcs
-
MD5
e01e6172da36d46a3e3f55f28a4e09fd
-
SHA1
185c5a4bfbe96364b34227897504f183a17c3cf9
-
SHA256
b0f2b52c30d5a96570024ff07324fcf2b8536b2a59ccc405c57a0ec8083d5bc6
-
SHA512
db55494334a7aa3ab896a1acdca9684a6ed716e687281510bb9698f62c1bf9bf56e82aa58937fd0f228c6a4e644e540f91bf30eee00c5d0505d360c807a6916f
-
SSDEEP
24576:CRmJkcoQricOIQxiZY1iaWYJLtrUyNHtv4au9VicGrovOLJncv9kZqNvOPXxb7:XJZoQrbTFZY1iaWYFttvACLLQ92eiBH
Static task
static1
Behavioral task
behavioral1
Sample
e01e6172da36d46a3e3f55f28a4e09fd_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.04.8
win
rickards.no-ip.org:82
3MDGV4G35KV23F
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
winupdate
-
install_file
updater.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
password
poak
Targets
-
-
Target
e01e6172da36d46a3e3f55f28a4e09fd_JaffaCakes118
-
Size
1.3MB
-
MD5
e01e6172da36d46a3e3f55f28a4e09fd
-
SHA1
185c5a4bfbe96364b34227897504f183a17c3cf9
-
SHA256
b0f2b52c30d5a96570024ff07324fcf2b8536b2a59ccc405c57a0ec8083d5bc6
-
SHA512
db55494334a7aa3ab896a1acdca9684a6ed716e687281510bb9698f62c1bf9bf56e82aa58937fd0f228c6a4e644e540f91bf30eee00c5d0505d360c807a6916f
-
SSDEEP
24576:CRmJkcoQricOIQxiZY1iaWYJLtrUyNHtv4au9VicGrovOLJncv9kZqNvOPXxb7:XJZoQrbTFZY1iaWYFttvACLLQ92eiBH
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-