General
-
Target
9a6b0786c8cb5b03737cd34601f95ca3_JaffaCakes118
-
Size
2.9MB
-
Sample
241125-kna4vavjbq
-
MD5
9a6b0786c8cb5b03737cd34601f95ca3
-
SHA1
03f9c9339538f1f008fe176259a7de852dece6a0
-
SHA256
f71c1996a4b8d489c12b42ceb6acad09d309847400b0fd48e29569de4d2044c3
-
SHA512
5acafab6250cba41b6cf70da255099f285552eb0ed892140c9c940c87008042619df0ccb479d420aeb7a7a81ba97f7c2e4e01fd3d1ccd575f2d4ca5b27b4c1c0
-
SSDEEP
49152:6f1Z8aC8sFIifBy/R9uZ3+n4Fiw6WF8I0ro9wX/agtInYSUQHX3JcT7dSxACQ03T:6f7lClIifBMR9L4Uwn8Ihwv8nYSUQ3o0
Static task
static1
Behavioral task
behavioral1
Sample
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
2.6
Server
tupcesmia.no-ip.info:600
***MUssasaTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
winrar
-
install_file
service.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe
-
Size
1.9MB
-
MD5
c2ffae39e5c34f536236bb5091015a14
-
SHA1
8b56c09ab59532be2fcbaad435aa29fe83dc06d4
-
SHA256
4ae8c730814de15982b8a560bbb5d9bc77f0dab0d57c0599088f3a9951a4a42a
-
SHA512
f366923c973664d0ffcc8538d081d2e431244ab290c5494f46f589e8cfcdbc980ce05f06f6759548c547536e36d952d355775d0e156396f937ec36b3208ebb3a
-
SSDEEP
24576:riYAAsz0SYdmqLIUk3wfonMUb86jTbbdamcBHnJyk:L
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
-
Size
133KB
-
MD5
647a69fedf52ad2a2483a4808eafbe10
-
SHA1
c33427510364ee64612f388225c79c06451ce794
-
SHA256
6591668f023450c726b6fa9f2caf534127173aa5a82d2e8386c60fc46133a050
-
SHA512
7f7fa098b8b1e17f03fc55a4a90d5b561e3e937fd4cca1b70e371c1e8d3924ec8e050ba6e94a83df081a030db77c49c89dd9da384c4da18c9184f310b8df5ba0
-
SSDEEP
1536:fqt8ORT7OYMn8Dow8ObQvBsIUdddddfHIWJhYE6jwdBgGLTJIbA8IKgRVAMve:fL8Dow8SIZsvYzjVOVIc8IKgRVAMve
Score3/10 -