General
-
Target
ba5648639afbd8699cd27c05eefdbbbc_JaffaCakes118
-
Size
201KB
-
Sample
241202-1pyvaszrbq
-
MD5
ba5648639afbd8699cd27c05eefdbbbc
-
SHA1
5fb7e1ba7c9f395c8e5b009e1c3973568a02fe1e
-
SHA256
ce818ec8ca5ef18fbd67340fa4250007021d7d934bbdde9e2c24f34ee09c46b8
-
SHA512
e4541edb7ad3be5cffcc290295217546f22789b4799edc20100a57f007615d7ea6ae9d3c627ec8465371ebe28f22a02c87851a1f50fa4f96dfe6d9b1aa5f2c3c
-
SSDEEP
6144:KXtV2143KFZXcKhWOkbdDA6Adi6rpbGEBOcny3j6U:KD217nXcKhWiTimBTOc8j6U
Static task
static1
Behavioral task
behavioral1
Sample
ba5648639afbd8699cd27c05eefdbbbc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.2.3
vítima
maryorievillavale.no-ip.org:80
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Windup
-
install_file
Audio32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
AdobeUpdate
-
regkey_hklm
AdobeX
Targets
-
-
Target
ba5648639afbd8699cd27c05eefdbbbc_JaffaCakes118
-
Size
201KB
-
MD5
ba5648639afbd8699cd27c05eefdbbbc
-
SHA1
5fb7e1ba7c9f395c8e5b009e1c3973568a02fe1e
-
SHA256
ce818ec8ca5ef18fbd67340fa4250007021d7d934bbdde9e2c24f34ee09c46b8
-
SHA512
e4541edb7ad3be5cffcc290295217546f22789b4799edc20100a57f007615d7ea6ae9d3c627ec8465371ebe28f22a02c87851a1f50fa4f96dfe6d9b1aa5f2c3c
-
SSDEEP
6144:KXtV2143KFZXcKhWOkbdDA6Adi6rpbGEBOcny3j6U:KD217nXcKhWiTimBTOc8j6U
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-