General
-
Target
94b59e7d6b6841728c87352e0400aa5a_JaffaCakes118
-
Size
233KB
-
Sample
241124-ps2jtazkhy
-
MD5
94b59e7d6b6841728c87352e0400aa5a
-
SHA1
90219c1194b5c9e52109214c179a3d53c34f0dfa
-
SHA256
427319a407c9ab10e18cdf783f61c7b83a3ebbcd38ae6cc61bc71f9b93e69fe6
-
SHA512
9bf44f99e1c0b83e4d5e420abfabef93b04c49f33da9a91726276888fe4025956d7513ba30a912f8fe3453b6c25e1230299c92fb3c2e3aaac55c2d44ea2979b1
-
SSDEEP
6144:UDl9Gyc+G5zQ7cugdfwwrdbs2fz/bc4i0d04:UDl9Grn5zQutr/bdd0
Behavioral task
behavioral1
Sample
94b59e7d6b6841728c87352e0400aa5a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.5
vítima
wonkwonkwonk.no-ip.org:81
MUTEXXXX
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
win3132
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
94b59e7d6b6841728c87352e0400aa5a_JaffaCakes118
-
Size
233KB
-
MD5
94b59e7d6b6841728c87352e0400aa5a
-
SHA1
90219c1194b5c9e52109214c179a3d53c34f0dfa
-
SHA256
427319a407c9ab10e18cdf783f61c7b83a3ebbcd38ae6cc61bc71f9b93e69fe6
-
SHA512
9bf44f99e1c0b83e4d5e420abfabef93b04c49f33da9a91726276888fe4025956d7513ba30a912f8fe3453b6c25e1230299c92fb3c2e3aaac55c2d44ea2979b1
-
SSDEEP
6144:UDl9Gyc+G5zQ7cugdfwwrdbs2fz/bc4i0d04:UDl9Grn5zQutr/bdd0
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-