General
-
Target
JaffaCakes118_13945c3352dd447f3da70cf25a368a7b
-
Size
1.0MB
-
Sample
250221-s4a3savmdm
-
MD5
13945c3352dd447f3da70cf25a368a7b
-
SHA1
8ae9255a87fad77ef72dbe6889b667cd00ea0f93
-
SHA256
f6ce3f9544d9d9999a154b08260730672fdecaf6ae6972142e3b8c2360cc4f9d
-
SHA512
2bb8877a3d8741e594158c16619fbcca4a90d8e6a7ac8d60fd10b3710c3951ad33912794543498b65278c181fd3316b374cf9a241ce4a93def2c4047b2f112eb
-
SSDEEP
24576:w3sYx8PaJ9EbUgcSw9in6xmsZORmQmE8D+:4x7P0UgNw9Q6xmTBCD+
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_13945c3352dd447f3da70cf25a368a7b.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
khkh.no-ip.info:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
min
-
install_file
Win_Xp.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please try again later.
-
message_box_title
Error
-
password
1
Targets
-
-
Target
JaffaCakes118_13945c3352dd447f3da70cf25a368a7b
-
Size
1.0MB
-
MD5
13945c3352dd447f3da70cf25a368a7b
-
SHA1
8ae9255a87fad77ef72dbe6889b667cd00ea0f93
-
SHA256
f6ce3f9544d9d9999a154b08260730672fdecaf6ae6972142e3b8c2360cc4f9d
-
SHA512
2bb8877a3d8741e594158c16619fbcca4a90d8e6a7ac8d60fd10b3710c3951ad33912794543498b65278c181fd3316b374cf9a241ce4a93def2c4047b2f112eb
-
SSDEEP
24576:w3sYx8PaJ9EbUgcSw9in6xmsZORmQmE8D+:4x7P0UgNw9Q6xmTBCD+
-
Cybergate family
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-