General
-
Target
2bd46cadf730df93ca24682e2dc509be_JaffaCakes118
-
Size
419KB
-
Sample
241009-gbepqatgnj
-
MD5
2bd46cadf730df93ca24682e2dc509be
-
SHA1
94f1fd94424364b7f5770eda24082ec2a30e2e12
-
SHA256
22ae9ebc516aa9d6460ed1f3f1470c4aab16ca4805a5fee3b459b878ad41637e
-
SHA512
d25dbe6978ae2c1469f6a058899bfcf06a6594f51a5dd5f6e49707ed6480fa5246c5a01452e2d818e23b993c242d8a768cdfd72ba686b156dd7362d17d2dd2f9
-
SSDEEP
6144:H6BsG/UrIrM+NW6o2SWnIq+ikCdGodAXbAFIJ23m24HyACZ7XbidbEFo6o:aBsG8r4/xS2hdEbAK23m24SAsDbcEa
Behavioral task
behavioral1
Sample
2bd46cadf730df93ca24682e2dc509be_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
cybergate
2.5
vítima
koko7878.no-ip.biz:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
Targets
-
-
Target
2bd46cadf730df93ca24682e2dc509be_JaffaCakes118
-
Size
419KB
-
MD5
2bd46cadf730df93ca24682e2dc509be
-
SHA1
94f1fd94424364b7f5770eda24082ec2a30e2e12
-
SHA256
22ae9ebc516aa9d6460ed1f3f1470c4aab16ca4805a5fee3b459b878ad41637e
-
SHA512
d25dbe6978ae2c1469f6a058899bfcf06a6594f51a5dd5f6e49707ed6480fa5246c5a01452e2d818e23b993c242d8a768cdfd72ba686b156dd7362d17d2dd2f9
-
SSDEEP
6144:H6BsG/UrIrM+NW6o2SWnIq+ikCdGodAXbAFIJ23m24HyACZ7XbidbEFo6o:aBsG8r4/xS2hdEbAK23m24SAsDbcEa
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-