General
-
Target
0601a85750f9a0cc5e6224e74f9429db_JaffaCakes118
-
Size
344KB
-
Sample
240623-pr1wwstgrn
-
MD5
0601a85750f9a0cc5e6224e74f9429db
-
SHA1
8abfedc3d008b3c0f878f5ef9905dbb02761a50a
-
SHA256
1bdf341da910e16269f9e62bdd0d1d40e6ee660a50f53f96aa836ea3d77bc2bb
-
SHA512
459f1f13e82c3a22867459ff7bcb54d9bb06a2e40ca6e8c24debe876646a8d697713f62dcad607c247ec0ed6a58b49cefc0e4b3f7fb00a63f6cd6e0bf061efce
-
SSDEEP
6144:2mcD66RT5JGmrpQsK3RD2u270jupCJsCxCcICk:jcD66QZ2zkPaCxx
Behavioral task
behavioral1
Sample
0601a85750f9a0cc5e6224e74f9429db_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
cybergate
2.6
noob
mattserverxd.zapto.org:7005
noobfrikilol
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
winacc
-
install_file
winacc.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
frikilol
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
latentbot
mattserverxd.zapto.org
Targets
-
-
Target
0601a85750f9a0cc5e6224e74f9429db_JaffaCakes118
-
Size
344KB
-
MD5
0601a85750f9a0cc5e6224e74f9429db
-
SHA1
8abfedc3d008b3c0f878f5ef9905dbb02761a50a
-
SHA256
1bdf341da910e16269f9e62bdd0d1d40e6ee660a50f53f96aa836ea3d77bc2bb
-
SHA512
459f1f13e82c3a22867459ff7bcb54d9bb06a2e40ca6e8c24debe876646a8d697713f62dcad607c247ec0ed6a58b49cefc0e4b3f7fb00a63f6cd6e0bf061efce
-
SSDEEP
6144:2mcD66RT5JGmrpQsK3RD2u270jupCJsCxCcICk:jcD66QZ2zkPaCxx
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-