General
-
Target
JaffaCakes118_b76df37e542e899085833c75ab9300e8
-
Size
348KB
-
Sample
250105-xdsmcsvlap
-
MD5
b76df37e542e899085833c75ab9300e8
-
SHA1
70eccb204b9330d9ebd7e5d671caacb4a5a57f25
-
SHA256
bbdc3c91018d9d98b1ef0c8e8aeaed2f8643c4617e7706ba7a805eb0556ae41b
-
SHA512
bdae509b9c5a662b4a6c20ac2f97b9add5599537cfa8290fa63eed488767c938320003bf11c7bb6232f3b1ae52efa0f7e39c5fd891431e701a826fc771ccc2c1
-
SSDEEP
6144:DalfOge4r8TYmSXoDSUprNjnus4PArIVg9UpT:r8r8XSXoDSau7wIVg9w
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b76df37e542e899085833c75ab9300e8.exe
Resource
win7-20240729-en
Malware Config
Extracted
cybergate
v1.07.5
luisma
10.0.0.4:6666
5GX52X70BQ8D4J
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
INFECTADO
-
message_box_title
CyberGate
-
password
luisma
Targets
-
-
Target
JaffaCakes118_b76df37e542e899085833c75ab9300e8
-
Size
348KB
-
MD5
b76df37e542e899085833c75ab9300e8
-
SHA1
70eccb204b9330d9ebd7e5d671caacb4a5a57f25
-
SHA256
bbdc3c91018d9d98b1ef0c8e8aeaed2f8643c4617e7706ba7a805eb0556ae41b
-
SHA512
bdae509b9c5a662b4a6c20ac2f97b9add5599537cfa8290fa63eed488767c938320003bf11c7bb6232f3b1ae52efa0f7e39c5fd891431e701a826fc771ccc2c1
-
SSDEEP
6144:DalfOge4r8TYmSXoDSUprNjnus4PArIVg9UpT:r8r8XSXoDSau7wIVg9w
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-