General
-
Target
JaffaCakes118_0a4f1b2847ca1364b7735ff236bc4af0
-
Size
322KB
-
Sample
250220-hqmjjs1jz3
-
MD5
0a4f1b2847ca1364b7735ff236bc4af0
-
SHA1
c8806b499605a048f743241bb4656d6956a0ce5d
-
SHA256
2ba078abed9db3198ef9a10933526fb944c4cac3d9a86303c86b26c1f3ead912
-
SHA512
91e46ec83cd31553cb8a0e4561c0f924c17734c7bd7249ac3b9a87354d2841db519ceeebf1a26d9fed0f102b76758b53fb255cdb7116c7c76ee8e784b8c25c16
-
SSDEEP
6144:mZGUXQToBkxRfnA/KLDBnlS670yGH3W5c6nIZx9yBIKkDM9SGEd9:+GDbGKJnlFjGXW55nIZxAko9e
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0a4f1b2847ca1364b7735ff236bc4af0.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v3.4.2.2
Paltalk
paltalkes.no-ip.org:4142
6084LR34SYD5R2
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Svcs.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123123456
Targets
-
-
Target
JaffaCakes118_0a4f1b2847ca1364b7735ff236bc4af0
-
Size
322KB
-
MD5
0a4f1b2847ca1364b7735ff236bc4af0
-
SHA1
c8806b499605a048f743241bb4656d6956a0ce5d
-
SHA256
2ba078abed9db3198ef9a10933526fb944c4cac3d9a86303c86b26c1f3ead912
-
SHA512
91e46ec83cd31553cb8a0e4561c0f924c17734c7bd7249ac3b9a87354d2841db519ceeebf1a26d9fed0f102b76758b53fb255cdb7116c7c76ee8e784b8c25c16
-
SSDEEP
6144:mZGUXQToBkxRfnA/KLDBnlS670yGH3W5c6nIZx9yBIKkDM9SGEd9:+GDbGKJnlFjGXW55nIZxAko9e
-
Cybergate family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-