Behavioral task
behavioral1
Sample
a10a0ce8c4d130628523b054b3cbb335_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a10a0ce8c4d130628523b054b3cbb335_JaffaCakes118
-
Size
336KB
-
MD5
a10a0ce8c4d130628523b054b3cbb335
-
SHA1
8e025447dc5b6347175a52011bab0e3fdc436910
-
SHA256
82e6e40196552be61b70ea906bf59e7236314dbd7f292c08427706a5962b27f9
-
SHA512
db1453d719f2371dd955013546ecdd275c564974d15bc05b9b95e353db93a35209075b19cdc68a6ca6f7e6ce12588cbc468c725f1649aa41a408acce99af41e0
-
SSDEEP
6144:d4ABF33pAuO/50BTnyZsSaXhh4XAS79hO9R0O91FG++Iq:mU2GLyWSKaAS79MEqfG
Malware Config
Extracted
cybergate
v1.05.1
victime
jerem13.no-ip.biz:1024
2L081P0BN8BK8A
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Le format de l'image n'est pas pris en charge
-
message_box_title
Erreur !
-
password
administrator
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
Files
-
a10a0ce8c4d130628523b054b3cbb335_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 263KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE