General
-
Target
bbcf778115c3bc52ccf78be5afdc36a4_JaffaCakes118
-
Size
329KB
-
Sample
241203-fl1t9swrfk
-
MD5
bbcf778115c3bc52ccf78be5afdc36a4
-
SHA1
afc259a86f0ec3a20ebc77fc3ded45097fc98a3b
-
SHA256
e261b60c2939239a2b7365026bd41a5ca9a380b16830e69e9da14b611f214009
-
SHA512
57348b0820303d10fdb045ecd29f46ae136d5bf70d789d7f8fe634447bef351fa9d485941b29023147582330d5bdf3dd305e34bf143919f88ef954e9db161c02
-
SSDEEP
6144:lVuhljEB/TZvZ9xkiH1fN/OUVNkEsJtb3p2SObkdz5Slb0iavszTaXSsjT:HIpI7ZhbH1f1Ouybb3p2SObe1yb0i7TS
Static task
static1
Behavioral task
behavioral1
Sample
bbcf778115c3bc52ccf78be5afdc36a4_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
cybergate
2.6
vítima
reylocoip.no-ip.org:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Windows Live
-
install_file
Messenger.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
bbcf778115c3bc52ccf78be5afdc36a4_JaffaCakes118
-
Size
329KB
-
MD5
bbcf778115c3bc52ccf78be5afdc36a4
-
SHA1
afc259a86f0ec3a20ebc77fc3ded45097fc98a3b
-
SHA256
e261b60c2939239a2b7365026bd41a5ca9a380b16830e69e9da14b611f214009
-
SHA512
57348b0820303d10fdb045ecd29f46ae136d5bf70d789d7f8fe634447bef351fa9d485941b29023147582330d5bdf3dd305e34bf143919f88ef954e9db161c02
-
SSDEEP
6144:lVuhljEB/TZvZ9xkiH1fN/OUVNkEsJtb3p2SObkdz5Slb0iavszTaXSsjT:HIpI7ZhbH1f1Ouybb3p2SObe1yb0i7TS
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-