General
-
Target
JaffaCakes118_627f3557b017020fb557e9fcb9fdd310
-
Size
875KB
-
Sample
250102-egkrta1rhs
-
MD5
627f3557b017020fb557e9fcb9fdd310
-
SHA1
d55d79aaf85255bc6d498ef545bd9691ab0759a3
-
SHA256
82c785791efb6b5316d69d9ea269419602583e0c5a56398b7fe74c5beb98dc03
-
SHA512
afef564161cc676b2f2b3fab40766082853645fcce5d8d024ba09bd573fe2072a5c17e7066587d6eaf75e1e59d60fd70fbbbf0d547c42cdb253247e3afd8e6d5
-
SSDEEP
24576:WYG3FGsvCDFnf06tEGCRM3mGnhCnpPCx8aKdU3kb6OLP:WYG3FGsvCDFnf06t3aMThCe88iLP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_627f3557b017020fb557e9fcb9fdd310.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v3.4.2.2
remote
kamikaz-hacke.zapto.org:2233
1Y1J18KSW046HE
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Targets
-
-
Target
JaffaCakes118_627f3557b017020fb557e9fcb9fdd310
-
Size
875KB
-
MD5
627f3557b017020fb557e9fcb9fdd310
-
SHA1
d55d79aaf85255bc6d498ef545bd9691ab0759a3
-
SHA256
82c785791efb6b5316d69d9ea269419602583e0c5a56398b7fe74c5beb98dc03
-
SHA512
afef564161cc676b2f2b3fab40766082853645fcce5d8d024ba09bd573fe2072a5c17e7066587d6eaf75e1e59d60fd70fbbbf0d547c42cdb253247e3afd8e6d5
-
SSDEEP
24576:WYG3FGsvCDFnf06tEGCRM3mGnhCnpPCx8aKdU3kb6OLP:WYG3FGsvCDFnf06t3aMThCe88iLP
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-