General
-
Target
JaffaCakes118_259430c654af26fb6ba7ce9521e4eba4
-
Size
1.3MB
-
Sample
250124-1d9seszkhv
-
MD5
259430c654af26fb6ba7ce9521e4eba4
-
SHA1
8209bf35c10a6239cd257bb2a8aec37b7d183d33
-
SHA256
8029e06b2fca551ac8b5d2d52270e7342fa1c0d1c4ed91d14cae4c484819fb22
-
SHA512
275d2bd889008e0d2635cbfca2b29a7fbd52015e47a8a9ba076e8842d9a49afd98942732764a65a1c2a0bab51f888d81612844b48ad9d96fc8a62897e7e66b8c
-
SSDEEP
24576:Nsfyf8kXSiOqwvJBFpG05rg49bxxBDik4PH9mljrXqdWXJT8xieB3gNbrSeDZ:+qftX6qwvJXpG0K49bH9ik4PHwl3a0eU
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_259430c654af26fb6ba7ce9521e4eba4.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
Rodimus
rodnew.no-ip.info:100
1NFWCNUQ1VQ33Y
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
polska
Targets
-
-
Target
JaffaCakes118_259430c654af26fb6ba7ce9521e4eba4
-
Size
1.3MB
-
MD5
259430c654af26fb6ba7ce9521e4eba4
-
SHA1
8209bf35c10a6239cd257bb2a8aec37b7d183d33
-
SHA256
8029e06b2fca551ac8b5d2d52270e7342fa1c0d1c4ed91d14cae4c484819fb22
-
SHA512
275d2bd889008e0d2635cbfca2b29a7fbd52015e47a8a9ba076e8842d9a49afd98942732764a65a1c2a0bab51f888d81612844b48ad9d96fc8a62897e7e66b8c
-
SSDEEP
24576:Nsfyf8kXSiOqwvJBFpG05rg49bxxBDik4PH9mljrXqdWXJT8xieB3gNbrSeDZ:+qftX6qwvJXpG0K49bH9ik4PHwl3a0eU
-
Cybergate family
-
Darkcomet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-