General
-
Target
JaffaCakes118_73565d7feaca00c2da659c15547223fe
-
Size
424KB
-
Sample
250116-mc32lawrfq
-
MD5
73565d7feaca00c2da659c15547223fe
-
SHA1
6e535f9fe9bf4e9a7d849a49d190151cac12bd02
-
SHA256
a30c40330acb77b8d239cb2cce1d2f07a1f2a4f62a62739cbb1bc7c53425a5c5
-
SHA512
c29268eda2dc3e287f56f7ca16092bc4fcb1eb223b3504b021b84f622bedbc50a6578f19947d440df0be66ddd906f7363a4cfd121eb859caca56538dd9138eee
-
SSDEEP
6144:PZwh7ML8kaNBWBDsqrlGHvG6mwlS/b2UoJa6SVwLfuy1R1Efatd17kyQQkxy+Tll:PZwhMp1BhxvwlH9a6cUJ1N/dQ/xy+Bl
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_73565d7feaca00c2da659c15547223fe.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.05.1
remote
127.0.0.1:95
3UQ3GA84BJIE6J
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_file
svchost.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
azerty
-
regkey_hkcu
HKCN
-
regkey_hklm
HKLO
Targets
-
-
Target
JaffaCakes118_73565d7feaca00c2da659c15547223fe
-
Size
424KB
-
MD5
73565d7feaca00c2da659c15547223fe
-
SHA1
6e535f9fe9bf4e9a7d849a49d190151cac12bd02
-
SHA256
a30c40330acb77b8d239cb2cce1d2f07a1f2a4f62a62739cbb1bc7c53425a5c5
-
SHA512
c29268eda2dc3e287f56f7ca16092bc4fcb1eb223b3504b021b84f622bedbc50a6578f19947d440df0be66ddd906f7363a4cfd121eb859caca56538dd9138eee
-
SSDEEP
6144:PZwh7ML8kaNBWBDsqrlGHvG6mwlS/b2UoJa6SVwLfuy1R1Efatd17kyQQkxy+Tll:PZwhMp1BhxvwlH9a6cUJ1N/dQ/xy+Bl
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-