General
-
Target
JaffaCakes118_6d1bc3e20a8a3fe2bbb0113e2be23f93
-
Size
468KB
-
Sample
250116-gpmx9awqdq
-
MD5
6d1bc3e20a8a3fe2bbb0113e2be23f93
-
SHA1
38d6bee1db08a6ed22efafa166783bd79f95c3e5
-
SHA256
2a27b69a8e2756b855d42c65a556e641407e48a363f612bd9dcf8f049bcad94c
-
SHA512
ea12274ad563d1ad25b6f4bcc5f4b38a6c762b824cc26ce83e74bbd3e6e09ff76828817b6c97d886b20a7498eb53625e3a904f8fc59f93fd2f0a75d24e74aa1a
-
SSDEEP
12288:OXaR+pvRDAvW8VsAN55cKIo+mat40of+cSbggLzI:xR+peh35qK054INjLzI
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d1bc3e20a8a3fe2bbb0113e2be23f93.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
cyber
57uytgh4.no-ip.info:1349
6LB10NV852QNQ0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
ZinWipToolBar.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
!!vocared9
Targets
-
-
Target
JaffaCakes118_6d1bc3e20a8a3fe2bbb0113e2be23f93
-
Size
468KB
-
MD5
6d1bc3e20a8a3fe2bbb0113e2be23f93
-
SHA1
38d6bee1db08a6ed22efafa166783bd79f95c3e5
-
SHA256
2a27b69a8e2756b855d42c65a556e641407e48a363f612bd9dcf8f049bcad94c
-
SHA512
ea12274ad563d1ad25b6f4bcc5f4b38a6c762b824cc26ce83e74bbd3e6e09ff76828817b6c97d886b20a7498eb53625e3a904f8fc59f93fd2f0a75d24e74aa1a
-
SSDEEP
12288:OXaR+pvRDAvW8VsAN55cKIo+mat40of+cSbggLzI:xR+peh35qK054INjLzI
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-