General
-
Target
57d464a90529a6af5dcda8721c312d49_JaffaCakes118
-
Size
523KB
-
Sample
241018-rbgt7ashqm
-
MD5
57d464a90529a6af5dcda8721c312d49
-
SHA1
05469d4c2b1d290894efa57f177cac2995d553d5
-
SHA256
063665d2c56067b86eaacaa3fbaad678c824170b32e26831a3c9e99dadb251ce
-
SHA512
573f0defb8e7a841ba0d152907903278e08d257f1a8f1b3348bf69c3825c85e5198bf0d104f307e8c09c04bc630017e2727484b146e8ba69fa9f58c03514a5bd
-
SSDEEP
12288:bt1uQdGi1gaD68Dx2USVVffru+SaHU0WmrvM1:R1jdGi1gaD2USfbuwU0Wmy
Behavioral task
behavioral1
Sample
57d464a90529a6af5dcda8721c312d49_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.5
vítima
127.0.0.1:81
adircool.no-ip.biz:8080
adircool.no-ip.biz:80
adircool.no-ip.biz:8081
Microsoft_JDH887ND
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
spynet
-
install_file
Microsoft_JDH887ND
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
ERROR. COULD NOT RUN THE EXECUTABLE.
-
message_box_title
ERROR
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
57d464a90529a6af5dcda8721c312d49_JaffaCakes118
-
Size
523KB
-
MD5
57d464a90529a6af5dcda8721c312d49
-
SHA1
05469d4c2b1d290894efa57f177cac2995d553d5
-
SHA256
063665d2c56067b86eaacaa3fbaad678c824170b32e26831a3c9e99dadb251ce
-
SHA512
573f0defb8e7a841ba0d152907903278e08d257f1a8f1b3348bf69c3825c85e5198bf0d104f307e8c09c04bc630017e2727484b146e8ba69fa9f58c03514a5bd
-
SSDEEP
12288:bt1uQdGi1gaD68Dx2USVVffru+SaHU0WmrvM1:R1jdGi1gaD2USfbuwU0Wmy
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-