General
-
Target
JaffaCakes118_ab08e225980c0347db6529a7326e4888
-
Size
404KB
-
Sample
250410-vksjtsxnz3
-
MD5
ab08e225980c0347db6529a7326e4888
-
SHA1
54288d5288de7acfdd87ad34465536330aa8d907
-
SHA256
974cc8eb70c8ff797b8963bcc6082ef77eac1e9b0e1e85f126a665a93cbcb2c6
-
SHA512
b39ff018503ee8f0413734270664917b9f9cebd741cd72d61438b3154139c06d1da0088a2fb73f2b17cdf35f5432c694be72a2d405a907078ac64a49ddbf0fe3
-
SSDEEP
6144:87Qr4UJsNXrFlMr69Uy3v9mEKQBVSohSoxvifp+98t+sstpOBqGS2UY:hr4YurF/Uy8onSZoBsrStpOBlS2UY
Malware Config
Extracted
cybergate
v1.07.5
Cyber
vnc.serveblog.net:2552
S7845S2C3JX3JL
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
admin22
Targets
-
-
Target
JaffaCakes118_ab08e225980c0347db6529a7326e4888
-
Size
404KB
-
MD5
ab08e225980c0347db6529a7326e4888
-
SHA1
54288d5288de7acfdd87ad34465536330aa8d907
-
SHA256
974cc8eb70c8ff797b8963bcc6082ef77eac1e9b0e1e85f126a665a93cbcb2c6
-
SHA512
b39ff018503ee8f0413734270664917b9f9cebd741cd72d61438b3154139c06d1da0088a2fb73f2b17cdf35f5432c694be72a2d405a907078ac64a49ddbf0fe3
-
SSDEEP
6144:87Qr4UJsNXrFlMr69Uy3v9mEKQBVSohSoxvifp+98t+sstpOBqGS2UY:hr4YurF/Uy8onSZoBsrStpOBlS2UY
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-