General
-
Target
JaffaCakes118_6f8f5e1e4e90bd03d40dc65f314724eb
-
Size
348KB
-
Sample
250313-jjwdjszvat
-
MD5
6f8f5e1e4e90bd03d40dc65f314724eb
-
SHA1
72b239406aaf462e96289411326018aeac1ea948
-
SHA256
5541a280cc5256e7f2c670b97bf2422bbff16146c50eb6facdf83f0e44b16f98
-
SHA512
a9e7e642279756c18f3f9f727b5a8d9173b4fa20fe0d6066e664b02a2a2027ac04e7be0df1b73042a64fe904ed9e6f42183c89869f847c9919c780cac7563d0e
-
SSDEEP
6144:sjp3rB4mlvq4PPmjQMERrP2hp+mX9qx+7EOEkCO0DXmQ+39ak1tk2u8jM:tA/PesLR7WYufYOhUYta0x7j
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f8f5e1e4e90bd03d40dc65f314724eb.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
127.0.0.1:288
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Targets
-
-
Target
JaffaCakes118_6f8f5e1e4e90bd03d40dc65f314724eb
-
Size
348KB
-
MD5
6f8f5e1e4e90bd03d40dc65f314724eb
-
SHA1
72b239406aaf462e96289411326018aeac1ea948
-
SHA256
5541a280cc5256e7f2c670b97bf2422bbff16146c50eb6facdf83f0e44b16f98
-
SHA512
a9e7e642279756c18f3f9f727b5a8d9173b4fa20fe0d6066e664b02a2a2027ac04e7be0df1b73042a64fe904ed9e6f42183c89869f847c9919c780cac7563d0e
-
SSDEEP
6144:sjp3rB4mlvq4PPmjQMERrP2hp+mX9qx+7EOEkCO0DXmQ+39ak1tk2u8jM:tA/PesLR7WYufYOhUYta0x7j
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-