General
-
Target
0be3baa07eae3aee1dbb46286861781a_JaffaCakes118
-
Size
481KB
-
Sample
240625-b83vxsxenq
-
MD5
0be3baa07eae3aee1dbb46286861781a
-
SHA1
ddc8d68e80025eb60535c4bf4dc48ee9f1cb872f
-
SHA256
8ecb3dab160dd97f315347b85af74e67c914efff6764ed699f23ae7a4b04ad04
-
SHA512
776d5d976dce7ad22ff1c9a7c2fe3a4b387e9f44711c2baada9caed13f1375ca3e579aa920bd9e26c4067be6623da9bf55bba1f5c214751e360dfc6a089226d2
-
SSDEEP
12288:lpYYiSq7OIh3UjKMl62W3Mq2PLDc70wMTNzoNOceGEgoUmF3Y3XKRdLqGacJd:rVIhEjKgu92PLDc70voEcelHUQ5Q
Behavioral task
behavioral1
Sample
0be3baa07eae3aee1dbb46286861781a_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
cybergate
2.7 Final
joker
cyberturk.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
.//wwwhome/
-
ftp_interval
30
-
ftp_password
906090
-
ftp_port
21
-
ftp_server
ftp.drivehq.com
-
ftp_username
By_GoGoL_PLEXS
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
þarký güzelmiþ
-
message_box_title
joker siker
-
password
1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
0be3baa07eae3aee1dbb46286861781a_JaffaCakes118
-
Size
481KB
-
MD5
0be3baa07eae3aee1dbb46286861781a
-
SHA1
ddc8d68e80025eb60535c4bf4dc48ee9f1cb872f
-
SHA256
8ecb3dab160dd97f315347b85af74e67c914efff6764ed699f23ae7a4b04ad04
-
SHA512
776d5d976dce7ad22ff1c9a7c2fe3a4b387e9f44711c2baada9caed13f1375ca3e579aa920bd9e26c4067be6623da9bf55bba1f5c214751e360dfc6a089226d2
-
SSDEEP
12288:lpYYiSq7OIh3UjKMl62W3Mq2PLDc70wMTNzoNOceGEgoUmF3Y3XKRdLqGacJd:rVIhEjKgu92PLDc70voEcelHUQ5Q
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-