General
-
Target
JaffaCakes118_62d3049e74ac6d37a5fe549176cee470
-
Size
555KB
-
Sample
250115-1p66nswlh1
-
MD5
62d3049e74ac6d37a5fe549176cee470
-
SHA1
fd1e5dd6898f9a459716214d69d6bc757ee39ee1
-
SHA256
6b8aabb239a42337ae14a04688523e6554d5e50783723869ca1eba8b725b751f
-
SHA512
1e0d3de35390fdf486abadf5ce0b24866304bf291857d819be26c78dea10b796436a438bceeb3ca2b83ccfe6d8d5af7ac94817157b3b0b2d4bb46359ea40317d
-
SSDEEP
6144:0he0IqpUaeOgHWAOHAzKabMxhdBCkWYxuukP1pjSKSNVkq/MVJb:0h9GaU2A5KrxTBd47GLRMTb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62d3049e74ac6d37a5fe549176cee470.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
vm
m756.3322.org:81
mabang.selfip.com:82
K8ES16Y131J5NG
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
svchast.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
00
Targets
-
-
Target
JaffaCakes118_62d3049e74ac6d37a5fe549176cee470
-
Size
555KB
-
MD5
62d3049e74ac6d37a5fe549176cee470
-
SHA1
fd1e5dd6898f9a459716214d69d6bc757ee39ee1
-
SHA256
6b8aabb239a42337ae14a04688523e6554d5e50783723869ca1eba8b725b751f
-
SHA512
1e0d3de35390fdf486abadf5ce0b24866304bf291857d819be26c78dea10b796436a438bceeb3ca2b83ccfe6d8d5af7ac94817157b3b0b2d4bb46359ea40317d
-
SSDEEP
6144:0he0IqpUaeOgHWAOHAzKabMxhdBCkWYxuukP1pjSKSNVkq/MVJb:0h9GaU2A5KrxTBd47GLRMTb
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-