General
-
Target
52d2168de3e750e314f63074de9d30f7_JaffaCakes118
-
Size
1.8MB
-
Sample
241017-vwkclazbnp
-
MD5
52d2168de3e750e314f63074de9d30f7
-
SHA1
68c44f2a5087b70f0a733e3f0cf6ec3c0e7c3bb0
-
SHA256
a08f723e50a0a7bde2abff17e797b042b677b541eda2d0b2212891bf186f31bb
-
SHA512
f7a149890610ac89ce5eb39a018731315c368a8f090e1e5045dd70d98ff4aeb1fb94b3963b25f12ae7b154793e5627d11f7d882b681031a816bd1f50637de261
-
SSDEEP
49152:0mKvnq7OPZqHkMCOfzA+QTKAdLKwzd3Ud:qvnqyDCA+/GLKwzd3Ud
Static task
static1
Behavioral task
behavioral1
Sample
TEAMVI~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TEAMVI~1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
amine.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
vítima
kinghacker.no-ip.biz:5150
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
TEAMVI~1.EXE
-
Size
5.0MB
-
MD5
3fd29f3cc09a83acb0b1b8d2881e5091
-
SHA1
f5102d01d54fbe5cbf8fba555427745c87b34393
-
SHA256
4f557e36fcce19b4b0a3c5ca426b4e7807ec6f783f07b73e76bd11eb878110d2
-
SHA512
a9865371d8044f7a544bd62806d402f65f78207187e660d799c55e5c71a90ea62078894adb25d5de05219fcecaf450c536255485d5b1e63035f9aa8543b0e004
-
SSDEEP
98304:++D24/5AX/Si8sItqL1pkYnV9Guw0L37B6XxR5HndBsvYOmN:v24/5aSOa/wg69GHwvYP
Score3/10 -
-
-
Target
amine.exe
-
Size
272KB
-
MD5
230782cdb07b9ece706ff008c3a45dbc
-
SHA1
8af56694d3243137b3f3bd00094ae6bb672f1a37
-
SHA256
a5ebf22ba40dca969d5185e17b5997094c4127edb2cf3280d7b6b2eaec9fe12b
-
SHA512
f74faa3f585c792fb5b5a919a5d80236ae169572a9b709a602d4f43e38e7f54439648f46df451197250e439f0edc3c83a622b3bdb6cbf2fb1c306d4580c3c574
-
SSDEEP
6144:TDGbdcVWxsFa0NGEH/5+rvtw9vRgvGITq+sFB+olLdxr:TDG5cVWMFEEf4w9vSvZqDPx1/r
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2