General
-
Target
46e06e9599dfc16ca020193e544150ef_JaffaCakes118
-
Size
324KB
-
Sample
241015-kyf3vazbql
-
MD5
46e06e9599dfc16ca020193e544150ef
-
SHA1
b5791b32837e43d4e38475bb3df3abd9fc8bdd39
-
SHA256
0a0b3820a11f24d1f0107a4cba71782c85e773b478f18e92afca8c558e50c6e5
-
SHA512
13c4c36e7d641e9a668e37d07ed15b259e3e5f02e23a11a7fb354cd4036844473585407b566afa95db847aea46d53bb003ed1363bc6e665cd8d662d41295782e
-
SSDEEP
6144:jUwge4ZMHGXD4yCHXILb2nYV08t5PiwkMZLeNuxJfThpDxL:jUw94wGz4ygDM08t5PRkufNpDp
Static task
static1
Behavioral task
behavioral1
Sample
46e06e9599dfc16ca020193e544150ef_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
Server
alewiboy.dyndns.org:3460
127.0.0.1:3460
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
sysistem
-
install_file
stsistem.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
1234
-
regkey_hklm
HKLM
Targets
-
-
Target
46e06e9599dfc16ca020193e544150ef_JaffaCakes118
-
Size
324KB
-
MD5
46e06e9599dfc16ca020193e544150ef
-
SHA1
b5791b32837e43d4e38475bb3df3abd9fc8bdd39
-
SHA256
0a0b3820a11f24d1f0107a4cba71782c85e773b478f18e92afca8c558e50c6e5
-
SHA512
13c4c36e7d641e9a668e37d07ed15b259e3e5f02e23a11a7fb354cd4036844473585407b566afa95db847aea46d53bb003ed1363bc6e665cd8d662d41295782e
-
SSDEEP
6144:jUwge4ZMHGXD4yCHXILb2nYV08t5PiwkMZLeNuxJfThpDxL:jUw94wGz4ygDM08t5PRkufNpDp
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-