General
-
Target
JaffaCakes118_27591c678efc89b04036de69ca7789d1
-
Size
684KB
-
Sample
250113-l17t1sxpfw
-
MD5
27591c678efc89b04036de69ca7789d1
-
SHA1
dc8c5c9f325274cfe250b2bc7e27fc31d0dc1076
-
SHA256
10568f616c7ca7ea3ce0cdd69d3172420cf813beb7332cdc8e87a6068eb9a8b9
-
SHA512
bb7d5c90ef379e30e8b62f2e2df85d3809e1c569f3baf1f1208d4ec7c521965cf93cd1e4a05655680442769eea6de20e5d2760b2fb418f0da432b54dbaad100b
-
SSDEEP
12288:WRFj6gjv/mh6FBe6dcD663VZ2zkPaCx1Tv9Gin0/:5gjv/Kee6dyZOklz9Gik
Behavioral task
behavioral1
Sample
JaffaCakes118_27591c678efc89b04036de69ca7789d1.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
Server
momohe.no-ip.biz:81
momohe.no-ip.biz:288
momohe.no-ip.biz:32
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
spynet
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
Targets
-
-
Target
JaffaCakes118_27591c678efc89b04036de69ca7789d1
-
Size
684KB
-
MD5
27591c678efc89b04036de69ca7789d1
-
SHA1
dc8c5c9f325274cfe250b2bc7e27fc31d0dc1076
-
SHA256
10568f616c7ca7ea3ce0cdd69d3172420cf813beb7332cdc8e87a6068eb9a8b9
-
SHA512
bb7d5c90ef379e30e8b62f2e2df85d3809e1c569f3baf1f1208d4ec7c521965cf93cd1e4a05655680442769eea6de20e5d2760b2fb418f0da432b54dbaad100b
-
SSDEEP
12288:WRFj6gjv/mh6FBe6dcD663VZ2zkPaCx1Tv9Gin0/:5gjv/Kee6dyZOklz9Gik
-
Cybergate family
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-