General
-
Target
0d7a806f76bab6cdbd2e08a380a6c2f9_JaffaCakes118
-
Size
455KB
-
Sample
240625-k2edestdnn
-
MD5
0d7a806f76bab6cdbd2e08a380a6c2f9
-
SHA1
dd758fe4f119f5876212a600e675dfaff2f449fb
-
SHA256
676a53fe096a00d736c8f192eed01f61d48e8cc381a033de7be986642c15685f
-
SHA512
575da68b53d2d753e8b566669e74b1abd2d9c20a7d436cf8940074d7718346d6368e63d8dc66e80afa41a2618a69a80a025e96f746b87b47b1d607b093b400a8
-
SSDEEP
12288:4isdI+OsvjLr6NWDXXjvRQMfBYcSZ31/hsGFUxevbw5:s5jvf5Y/6G
Static task
static1
Behavioral task
behavioral1
Sample
0d7a806f76bab6cdbd2e08a380a6c2f9_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
cybergate
v1.07.5
Thorent
84.132.173.241:100
E644SB44R75E3U
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
5
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Can't open the File!
-
message_box_title
Error #107
-
password
bine@12
Targets
-
-
Target
0d7a806f76bab6cdbd2e08a380a6c2f9_JaffaCakes118
-
Size
455KB
-
MD5
0d7a806f76bab6cdbd2e08a380a6c2f9
-
SHA1
dd758fe4f119f5876212a600e675dfaff2f449fb
-
SHA256
676a53fe096a00d736c8f192eed01f61d48e8cc381a033de7be986642c15685f
-
SHA512
575da68b53d2d753e8b566669e74b1abd2d9c20a7d436cf8940074d7718346d6368e63d8dc66e80afa41a2618a69a80a025e96f746b87b47b1d607b093b400a8
-
SSDEEP
12288:4isdI+OsvjLr6NWDXXjvRQMfBYcSZ31/hsGFUxevbw5:s5jvf5Y/6G
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-