General
-
Target
JaffaCakes118_acb89308b319dee6e346d622a73b4b2b
-
Size
338KB
-
Sample
250411-dya39symw3
-
MD5
acb89308b319dee6e346d622a73b4b2b
-
SHA1
7ef85cfd629767d9dc06bd7d1ddbe88726f8c638
-
SHA256
ecf1230d0c35e08e63cdae814bca3d67a6e8527b72eb066a4c2ebbf479d28e05
-
SHA512
a95566ce8c5242f0154c488e617eebbbee2ef1548d8931c30261930fd4bba9faa0fca768e684bd374684618633ed43bc3c373057f03915a020767813ab4e417e
-
SSDEEP
6144:B5/G0N63UDkn8uszQAzrUnYkxe81AN9PShCpD6vvBnB1Hxb9IWLG:Tx6eusyn3oeAN5CvBTH
Malware Config
Extracted
cybergate
v1.00.1
remote
127.0.0.1:999
matrix-zloy.no-ip.biz:81
matrix-zloy.no-ip.biz:1435
CyberGate1
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
system.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
280485
Targets
-
-
Target
JaffaCakes118_acb89308b319dee6e346d622a73b4b2b
-
Size
338KB
-
MD5
acb89308b319dee6e346d622a73b4b2b
-
SHA1
7ef85cfd629767d9dc06bd7d1ddbe88726f8c638
-
SHA256
ecf1230d0c35e08e63cdae814bca3d67a6e8527b72eb066a4c2ebbf479d28e05
-
SHA512
a95566ce8c5242f0154c488e617eebbbee2ef1548d8931c30261930fd4bba9faa0fca768e684bd374684618633ed43bc3c373057f03915a020767813ab4e417e
-
SSDEEP
6144:B5/G0N63UDkn8uszQAzrUnYkxe81AN9PShCpD6vvBnB1Hxb9IWLG:Tx6eusyn3oeAN5CvBTH
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-