General
-
Target
JaffaCakes118_7ae0f55f96c886e7d98ccbf9c556f8d5
-
Size
539KB
-
Sample
250116-s41cnsxkez
-
MD5
7ae0f55f96c886e7d98ccbf9c556f8d5
-
SHA1
f1a575e4e94427c228eb47f881ad44c7de5d8be9
-
SHA256
77299ea0726759ae89c9a070199d887e64ba5e813c34531dfd2a992c7da63642
-
SHA512
c8f6794bdbfab4d22e6b7844fbb98ea63931d62f016d6202f0b33ac2429ed87a7a8c70fe5bfda287044f8b2020ded4cb6baa3ca1a5a19e9a64f4b3c687bd4650
-
SSDEEP
12288:4njgKiW8sTCaUmau2aye94WAVKCHy3u2nSOkH0:4jxR9JuetyKCHoFpk
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ae0f55f96c886e7d98ccbf9c556f8d5.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
vítima
127.0.0.1:81
hacker-00007.no-ip.biz:81
***MUTEX788546932158***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
commande.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
Targets
-
-
Target
JaffaCakes118_7ae0f55f96c886e7d98ccbf9c556f8d5
-
Size
539KB
-
MD5
7ae0f55f96c886e7d98ccbf9c556f8d5
-
SHA1
f1a575e4e94427c228eb47f881ad44c7de5d8be9
-
SHA256
77299ea0726759ae89c9a070199d887e64ba5e813c34531dfd2a992c7da63642
-
SHA512
c8f6794bdbfab4d22e6b7844fbb98ea63931d62f016d6202f0b33ac2429ed87a7a8c70fe5bfda287044f8b2020ded4cb6baa3ca1a5a19e9a64f4b3c687bd4650
-
SSDEEP
12288:4njgKiW8sTCaUmau2aye94WAVKCHy3u2nSOkH0:4jxR9JuetyKCHoFpk
-
Cybergate family
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-