General
-
Target
5a3fb13a55b2c25ac60a5b9731dec4e9_JaffaCakes118
-
Size
304KB
-
Sample
240719-drspqstcld
-
MD5
5a3fb13a55b2c25ac60a5b9731dec4e9
-
SHA1
a005e1909625a0e11ff61da6ea5fa6dd9f39993e
-
SHA256
e665688f62949c935f75ec6c30383dcc6c43fc28cb47d5c3512493cdaaebcbb7
-
SHA512
866b44239e66a871998e85c072c1e2563c8ce648a72e9a0ca8cd743c5f6cd9f6acdbe1e18b074ae8ab876176e74e53db276ccced78c68cc12a7d9e0cbaba10e7
-
SSDEEP
6144:YHo4wYxHRMrP3Lb7AUwdZZs33j1MT7IGooq5W2ILKuGAOeW:YHo8IrL8ZW3zIIGA5YLKuTr
Static task
static1
Behavioral task
behavioral1
Sample
5a3fb13a55b2c25ac60a5b9731dec4e9_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
cybergate
RaT
vítima
127.0.0.1:83
ch4wk.no-ip.info:83
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
google.exe
-
install_dir
google
-
install_file
vschost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
5a3fb13a55b2c25ac60a5b9731dec4e9_JaffaCakes118
-
Size
304KB
-
MD5
5a3fb13a55b2c25ac60a5b9731dec4e9
-
SHA1
a005e1909625a0e11ff61da6ea5fa6dd9f39993e
-
SHA256
e665688f62949c935f75ec6c30383dcc6c43fc28cb47d5c3512493cdaaebcbb7
-
SHA512
866b44239e66a871998e85c072c1e2563c8ce648a72e9a0ca8cd743c5f6cd9f6acdbe1e18b074ae8ab876176e74e53db276ccced78c68cc12a7d9e0cbaba10e7
-
SSDEEP
6144:YHo4wYxHRMrP3Lb7AUwdZZs33j1MT7IGooq5W2ILKuGAOeW:YHo8IrL8ZW3zIIGA5YLKuTr
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-