Behavioral task
behavioral1
Sample
93cb61190cbb7ccd1a9f1c4544e5b3b8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
93cb61190cbb7ccd1a9f1c4544e5b3b8_JaffaCakes118
-
Size
944KB
-
MD5
93cb61190cbb7ccd1a9f1c4544e5b3b8
-
SHA1
742ea5fbf5576776e77e0de000ffcb10c5d5e6d7
-
SHA256
d85b71f5aefcbf3036fe626e008506c4da6a26e8d1f36d6d6b5fcbc5aa408915
-
SHA512
52ea52057e1e8f89a1e01780e8fe17d87b4719a561b2184f874c3c389cc19143e6e25ab656620dd7c9bd3636c09d23f1b5954182a1821f4a80566e6250cee2f4
-
SSDEEP
6144:ZOpslvqXFahdBCkWYxuukP1pjSKSNVkq/MVJb9INFJMWB:ZwslmaTBd47GLRMTbO
Malware Config
Extracted
cybergate
v1.07.5
exploit4
r50.no-ip.info:81
6315CDT3RC03OG
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install56565
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
kokusha123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
Files
-
93cb61190cbb7ccd1a9f1c4544e5b3b8_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 456KB - Virtual size: 456KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 295KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE