General
-
Target
JaffaCakes118_3ca3c2a849524f910d771a1300fe2d52
-
Size
670KB
-
Sample
250127-gta49avla1
-
MD5
3ca3c2a849524f910d771a1300fe2d52
-
SHA1
a5dd72ae84a7ad3c3489674589ec6385dd365a68
-
SHA256
d1fb6ee648be77f6ab005eea76d8c1be4beca04a5c17f4809949f23bc0c8ba63
-
SHA512
6b47ce7ed7a318f10482f46f2cdcb0821d8620ccee1d1042382fdffa9dbf0df2927e707bd03bf3d3e02013a5723311ab969207f07c21a88636b87d5499910fd9
-
SSDEEP
12288:53VRPcEDYVuL4qxnDJoxKxzqvAy4VGCQw6oR2K3dW4fI3d/:XR3YVuvxnDJfkDBGAAwZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3ca3c2a849524f910d771a1300fe2d52.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3ca3c2a849524f910d771a1300fe2d52.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
v1.07.5
Tencent
symeon3melrich.no-ip.org:45010
danielclaudede.dyndns.org:13889
murazawahara.no-ip.info:7070
4F65LA3N53DH5P
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
ZBj2
Targets
-
-
Target
JaffaCakes118_3ca3c2a849524f910d771a1300fe2d52
-
Size
670KB
-
MD5
3ca3c2a849524f910d771a1300fe2d52
-
SHA1
a5dd72ae84a7ad3c3489674589ec6385dd365a68
-
SHA256
d1fb6ee648be77f6ab005eea76d8c1be4beca04a5c17f4809949f23bc0c8ba63
-
SHA512
6b47ce7ed7a318f10482f46f2cdcb0821d8620ccee1d1042382fdffa9dbf0df2927e707bd03bf3d3e02013a5723311ab969207f07c21a88636b87d5499910fd9
-
SSDEEP
12288:53VRPcEDYVuL4qxnDJoxKxzqvAy4VGCQw6oR2K3dW4fI3d/:XR3YVuvxnDJfkDBGAAwZ
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-