General
-
Target
cdbedf6e61cd1a5c8295143d39719ffa_JaffaCakes118
-
Size
902KB
-
Sample
241206-syn3fstras
-
MD5
cdbedf6e61cd1a5c8295143d39719ffa
-
SHA1
6ce3f00272252560b7f4df5cd0d77ff85788d277
-
SHA256
cf9f6f56ecfafc856c5a91d451ea68cfabf56e491eda20f5b0df93dcaaa115c1
-
SHA512
a8f93e083ced3e4860050de1a77df9481bf787503de87b4df1c8144c636595a66d4c8f1ef9cd49f95976a7fe33f4560dfbd513df51569845b2fdeb33ae37a3f7
-
SSDEEP
12288:I8ao7YNQ3LPxez8dFlZqBpUzeOXC7g9QjUFfRN+5qJC/hEE8lIjoiNXXakpbhE3F:V7wQEz+8DOdrJC/WE8lXiEkhguE
Static task
static1
Behavioral task
behavioral1
Sample
cdbedf6e61cd1a5c8295143d39719ffa_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
kahraman
spycoder.no-ip.biz:2222
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
54615461
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
cdbedf6e61cd1a5c8295143d39719ffa_JaffaCakes118
-
Size
902KB
-
MD5
cdbedf6e61cd1a5c8295143d39719ffa
-
SHA1
6ce3f00272252560b7f4df5cd0d77ff85788d277
-
SHA256
cf9f6f56ecfafc856c5a91d451ea68cfabf56e491eda20f5b0df93dcaaa115c1
-
SHA512
a8f93e083ced3e4860050de1a77df9481bf787503de87b4df1c8144c636595a66d4c8f1ef9cd49f95976a7fe33f4560dfbd513df51569845b2fdeb33ae37a3f7
-
SSDEEP
12288:I8ao7YNQ3LPxez8dFlZqBpUzeOXC7g9QjUFfRN+5qJC/hEE8lIjoiNXXakpbhE3F:V7wQEz+8DOdrJC/WE8lXiEkhguE
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-