Behavioral task
behavioral1
Sample
a5ff7e4dd3fee19b6d5498a0924d2e4d_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a5ff7e4dd3fee19b6d5498a0924d2e4d_JaffaCakes118
-
Size
353KB
-
MD5
a5ff7e4dd3fee19b6d5498a0924d2e4d
-
SHA1
7a2b33f0afe8dc287ed16a4a567c34c572eadd24
-
SHA256
bd5140c7f42b7628f2bd8aed645f556157159eaa834231ad483c85bd4d51d8c5
-
SHA512
d8e54a347d712ade085338848d2a811685e721c09e636febb13971912762914eb68e544669966790c3dea0afff4d8ee5f91b224469b0b641239d4a4de5db1285
-
SSDEEP
6144:8mcD66R85JGmrpQsK3RD2u270jupCJsCxCMI3I1:NcD66fZ2zkPaCxE
Malware Config
Extracted
cybergate
2.6
INFECTADO
pepebotella.no-ip.org:3000
hardisk
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
Driver
-
install_file
driver.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Acesso denegado
-
message_box_title
Error
-
password
pepe
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
Files
-
a5ff7e4dd3fee19b6d5498a0924d2e4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE