General
-
Target
ac710fdd7b45de73889d3fcccb0c7e7e_JaffaCakes118
-
Size
340KB
-
Sample
241128-qhpypsylgs
-
MD5
ac710fdd7b45de73889d3fcccb0c7e7e
-
SHA1
bdff51012e7f286c7e4e2f123192df1c468f6263
-
SHA256
c504ffa39332b34a325a9b1409ac5bdb86595d2b8c3d8248b141b5987455827b
-
SHA512
4d4d6f7530b8291e921d9dcc92be9c75b6dac7cc77b392e9ffaf62d8e165c8edcc0e30363d643dd5d5c1597dcc26dd0fa094dc58cf22b9843392043e58c72045
-
SSDEEP
6144:/Yv0aGYXpO8+MPl3EpElF5289/n/LkWh6L4CNhEywaFmwSoX6Uptu1QJdco0gr:gRGYXh+IF9/n/Lk4O4CBwaAwr6hkdcBw
Static task
static1
Behavioral task
behavioral1
Sample
ac710fdd7b45de73889d3fcccb0c7e7e_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
cybergate
2.6
vítima
187.15.137.123:81
creed.myftp.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
Targets
-
-
Target
ac710fdd7b45de73889d3fcccb0c7e7e_JaffaCakes118
-
Size
340KB
-
MD5
ac710fdd7b45de73889d3fcccb0c7e7e
-
SHA1
bdff51012e7f286c7e4e2f123192df1c468f6263
-
SHA256
c504ffa39332b34a325a9b1409ac5bdb86595d2b8c3d8248b141b5987455827b
-
SHA512
4d4d6f7530b8291e921d9dcc92be9c75b6dac7cc77b392e9ffaf62d8e165c8edcc0e30363d643dd5d5c1597dcc26dd0fa094dc58cf22b9843392043e58c72045
-
SSDEEP
6144:/Yv0aGYXpO8+MPl3EpElF5289/n/LkWh6L4CNhEywaFmwSoX6Uptu1QJdco0gr:gRGYXh+IF9/n/Lk4O4CBwaAwr6hkdcBw
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-