General
-
Target
JaffaCakes118_78935c66e2ecd70a8a5c1fd3d9d9d9d2
-
Size
288KB
-
Sample
250104-jwn51azrbz
-
MD5
78935c66e2ecd70a8a5c1fd3d9d9d9d2
-
SHA1
934243513fbc4078b4389f0a68365398f1350838
-
SHA256
f29ab36f7c3387e7ad4615d5427ddc14c2bfdb427ef7ad6b579cda272b7b61de
-
SHA512
adbaff0e2efed5fe1d75ce4d5ed1a63220da12f73f0df438ee6de6f3dbf5a57cb9b73f7692d125e8b82ccd87f1a061fae2d7c9b3bbe62a2d00e934c34b5d32a9
-
SSDEEP
6144:bNjzntMXVUoPVSQ+5j8q2LWwX/g8se+8FrJG6O1mxiP:bBWUo9SQ+5j8uwvg3YO6O1X
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_78935c66e2ecd70a8a5c1fd3d9d9d9d2.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.02.1
Lammer
127.0.0.1:81
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Pluguin.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
fd
Targets
-
-
Target
JaffaCakes118_78935c66e2ecd70a8a5c1fd3d9d9d9d2
-
Size
288KB
-
MD5
78935c66e2ecd70a8a5c1fd3d9d9d9d2
-
SHA1
934243513fbc4078b4389f0a68365398f1350838
-
SHA256
f29ab36f7c3387e7ad4615d5427ddc14c2bfdb427ef7ad6b579cda272b7b61de
-
SHA512
adbaff0e2efed5fe1d75ce4d5ed1a63220da12f73f0df438ee6de6f3dbf5a57cb9b73f7692d125e8b82ccd87f1a061fae2d7c9b3bbe62a2d00e934c34b5d32a9
-
SSDEEP
6144:bNjzntMXVUoPVSQ+5j8q2LWwX/g8se+8FrJG6O1mxiP:bBWUo9SQ+5j8uwvg3YO6O1X
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-