General
-
Target
931ba8bfb7b58bb012d123261b9ccedf_JaffaCakes118
-
Size
768KB
-
Sample
240813-pv9yzateng
-
MD5
931ba8bfb7b58bb012d123261b9ccedf
-
SHA1
539fbfa32783bd594be2a5025ae775bf4a76386a
-
SHA256
c11de1b2329d4574240777ff1d59b849439f9e805c5c4ade50b4d912316edb49
-
SHA512
7877b71ee7c1bfa90a3485ee6d60f7bc2ebc857c5005f961dea95c59a0861c24c7ad2f917b88bda729692cc2cd1c07a92edc716b1292b6d049790db900fd8c1f
-
SSDEEP
12288:wKTzdQO7b30SGV9KrdvDaVkvIlLACz6vy1wskXf2aTogivJDBZn8aUiaku2:zTzdQO7z0rydvDdIKCz6vVskX1iB1Z8G
Static task
static1
Behavioral task
behavioral1
Sample
931ba8bfb7b58bb012d123261b9ccedf_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
cybergate
2.7 Final
vítima
gilegileremaja.hopto.org:81
asdfsadffdsaaf)&F)SD)FDSJF*DSY08Yh*)Sd*Hf*f
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
.//public_html/logs/
-
ftp_interval
30
-
ftp_password
nBkYKA
-
ftp_port
21
-
ftp_server
dna2010.co.cc
-
ftp_username
a2923631
-
injected_process
svchost.exe
-
install_dir
updater
-
install_file
update.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
ahakahak123
Targets
-
-
Target
931ba8bfb7b58bb012d123261b9ccedf_JaffaCakes118
-
Size
768KB
-
MD5
931ba8bfb7b58bb012d123261b9ccedf
-
SHA1
539fbfa32783bd594be2a5025ae775bf4a76386a
-
SHA256
c11de1b2329d4574240777ff1d59b849439f9e805c5c4ade50b4d912316edb49
-
SHA512
7877b71ee7c1bfa90a3485ee6d60f7bc2ebc857c5005f961dea95c59a0861c24c7ad2f917b88bda729692cc2cd1c07a92edc716b1292b6d049790db900fd8c1f
-
SSDEEP
12288:wKTzdQO7b30SGV9KrdvDaVkvIlLACz6vy1wskXf2aTogivJDBZn8aUiaku2:zTzdQO7z0rydvDdIKCz6vVskX1iB1Z8G
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-