General
-
Target
JaffaCakes118_172e90aef487cf51ea9885708679a122
-
Size
516KB
-
Sample
250123-plbpta1ncn
-
MD5
172e90aef487cf51ea9885708679a122
-
SHA1
511cf2a267b0c259568cde2c6db4f42417ff269a
-
SHA256
51f5ddc8f1accc20ec871ac5669b399e528a3051394fa2bde9fde0ccffaa4832
-
SHA512
d003a9da7ec7d5163b3b370dcd94d37ce9f1139c47f34291922797194975a95e30bdce6d55364a2cc298e88e6111c86e40c647752391ea5a011ad27b7156abb6
-
SSDEEP
12288:Xlipl65gohXTi7ijbFttlvITb/s39GHFcuvlIWF8Hk:ViP65g4XTi7WFajs3sHFczW
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_172e90aef487cf51ea9885708679a122.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
remote
nikola.no-ip.info:1000
2X5RJ3E62HPG61
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Targets
-
-
Target
JaffaCakes118_172e90aef487cf51ea9885708679a122
-
Size
516KB
-
MD5
172e90aef487cf51ea9885708679a122
-
SHA1
511cf2a267b0c259568cde2c6db4f42417ff269a
-
SHA256
51f5ddc8f1accc20ec871ac5669b399e528a3051394fa2bde9fde0ccffaa4832
-
SHA512
d003a9da7ec7d5163b3b370dcd94d37ce9f1139c47f34291922797194975a95e30bdce6d55364a2cc298e88e6111c86e40c647752391ea5a011ad27b7156abb6
-
SSDEEP
12288:Xlipl65gohXTi7ijbFttlvITb/s39GHFcuvlIWF8Hk:ViP65g4XTi7WFajs3sHFczW
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-