General
-
Target
JaffaCakes118_036787795a1142aba7f6c6420328764b
-
Size
1.4MB
-
Sample
250121-krew7svpbs
-
MD5
036787795a1142aba7f6c6420328764b
-
SHA1
b821ce6fcb1905937c70329e6934961e9c70a65f
-
SHA256
835f5d029588a068436b2814729f150b8e9b5e04ada725547d4e2b3e9e1a0157
-
SHA512
f374d8391da9a701d3c71e687ec09b9bb4db9954c34c7129a42f16ff85c658202e1b1d413878e4a17be78cc8eb63be1a2ede90342857c42bcb8d999a71a0c7ab
-
SSDEEP
12288:iDwBnFvQaqNbs/X/gfc2wIw14lj5/ojIt0fuEUecf3+w1PFTY5m7aC5G3u3x:Jssng2140ItQuEdY3+7gD3x
Behavioral task
behavioral1
Sample
JaffaCakes118_036787795a1142aba7f6c6420328764b.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
A7tRaf
mhmd33.no-ip.biz:999
0V071X0AVO0G5G
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
system
-
install_file
Update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
svchost
-
regkey_hklm
svchost
Targets
-
-
Target
JaffaCakes118_036787795a1142aba7f6c6420328764b
-
Size
1.4MB
-
MD5
036787795a1142aba7f6c6420328764b
-
SHA1
b821ce6fcb1905937c70329e6934961e9c70a65f
-
SHA256
835f5d029588a068436b2814729f150b8e9b5e04ada725547d4e2b3e9e1a0157
-
SHA512
f374d8391da9a701d3c71e687ec09b9bb4db9954c34c7129a42f16ff85c658202e1b1d413878e4a17be78cc8eb63be1a2ede90342857c42bcb8d999a71a0c7ab
-
SSDEEP
12288:iDwBnFvQaqNbs/X/gfc2wIw14lj5/ojIt0fuEUecf3+w1PFTY5m7aC5G3u3x:Jssng2140ItQuEdY3+7gD3x
-
Cybergate family
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-