General
-
Target
f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118
-
Size
365KB
-
Sample
241214-139hysxnfl
-
MD5
f0f1d182738e94a5e8a8b78a45bd0947
-
SHA1
ef158664f86472a86a0256ae1552221a19ea60ad
-
SHA256
f4ce835f1644ad798075acbd4229477cff4c3f17c328ef2fcea8719265328759
-
SHA512
3544c456c665fb797a09a24193cc1dcbebb7e7c93db3ae69396a46c4557f53564a8e52e55efe453a507ce0a43d47d3c106ecfdf167f6dd071ae9277258c968c2
-
SSDEEP
6144:FkJ2vr65Z+VkLzfgJb4GBbdddddddogBYXqSVJ7wjbrPBvIdblysg/j2AI+I9Nb7:FkxYyrYUGBbdddddddogaac+rPBvIdRt
Static task
static1
Behavioral task
behavioral1
Sample
f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
v1.11.0 - Public Version
remote
copra.zapto.org:81
6J855JHG424JGA
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
exeplorere.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
copra
Targets
-
-
Target
f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118
-
Size
365KB
-
MD5
f0f1d182738e94a5e8a8b78a45bd0947
-
SHA1
ef158664f86472a86a0256ae1552221a19ea60ad
-
SHA256
f4ce835f1644ad798075acbd4229477cff4c3f17c328ef2fcea8719265328759
-
SHA512
3544c456c665fb797a09a24193cc1dcbebb7e7c93db3ae69396a46c4557f53564a8e52e55efe453a507ce0a43d47d3c106ecfdf167f6dd071ae9277258c968c2
-
SSDEEP
6144:FkJ2vr65Z+VkLzfgJb4GBbdddddddogBYXqSVJ7wjbrPBvIdblysg/j2AI+I9Nb7:FkxYyrYUGBbdddddddogaac+rPBvIdRt
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Suspicious use of SetThreadContext
-