Behavioral task
behavioral1
Sample
25dca0241da74f79276f5d3462f21313_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
25dca0241da74f79276f5d3462f21313_JaffaCakes118
-
Size
702KB
-
MD5
25dca0241da74f79276f5d3462f21313
-
SHA1
73117c04370872416c8cf8211ddc294e475af704
-
SHA256
fe3055c1cd8ca5edeec09379c1c65825593e4d42a3515044c637ec51e5ba123f
-
SHA512
3a839586cda470420781ef10b347d95d2f4755f2b2a9ba5dbe219dee7ce68254731cbd373265546d42c98d43283f5e47f9496fb9736cd0fa5e8c0f083d9bcf06
-
SSDEEP
12288:kcD66kQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQR:kFLtwCc26uGi2VCHXSBzTaDMsAQR
Malware Config
Extracted
cybergate
2.7 Final
Proagroin
127.0.0.1:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./hacker/
-
ftp_interval
60
-
ftp_password
503690138
-
ftp_port
21
-
ftp_server
ftp.webcindario.com
-
ftp_username
henryjason2011
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
MSConfig.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
123456
Signatures
Files
-
25dca0241da74f79276f5d3462f21313_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 473KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE