General
-
Target
68cc57b21098f5aaac89940db6148c32_JaffaCakes118
-
Size
532KB
-
Sample
241022-eh3n1sxgpk
-
MD5
68cc57b21098f5aaac89940db6148c32
-
SHA1
02b7f10b35e9f6457474de49f606f48e42448150
-
SHA256
0a15201df7ba59c625ba114adfca29b9c1eb75bb019a91953f3df5aca7eb52c3
-
SHA512
99c45a6ebcf1be174e920ec28d3e172161adb783da712dd14a1051f8408a9395049862d35daf1779bdea80a8e18dfc5ff127b7d4651e9ab84ccb6bf9eec25db0
-
SSDEEP
12288:5oz/vnjEjimPHoAT3lAutlvPoH/ygW9cBNM+fpjyimmPTLLcsE:WHjEPPoAT3lAe+/lzfpjU2gsE
Static task
static1
Behavioral task
behavioral1
Sample
68cc57b21098f5aaac89940db6148c32_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
2.6
vítima
fadimetal.zapto.org:81
Cela.C.M
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
ftp_password
ª÷Öº+Þ
-
ftp_port
21
-
ftp_server
ftp.server.com
-
ftp_username
ftp_user
-
injected_process
explorer.exe
-
install_file
cela.c.m.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
Targets
-
-
Target
68cc57b21098f5aaac89940db6148c32_JaffaCakes118
-
Size
532KB
-
MD5
68cc57b21098f5aaac89940db6148c32
-
SHA1
02b7f10b35e9f6457474de49f606f48e42448150
-
SHA256
0a15201df7ba59c625ba114adfca29b9c1eb75bb019a91953f3df5aca7eb52c3
-
SHA512
99c45a6ebcf1be174e920ec28d3e172161adb783da712dd14a1051f8408a9395049862d35daf1779bdea80a8e18dfc5ff127b7d4651e9ab84ccb6bf9eec25db0
-
SSDEEP
12288:5oz/vnjEjimPHoAT3lAutlvPoH/ygW9cBNM+fpjyimmPTLLcsE:WHjEPPoAT3lAe+/lzfpjU2gsE
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1