General
-
Target
da1f26afd43c51be872cc8c7fba46015_JaffaCakes118
-
Size
346KB
-
Sample
241209-r2p89a1khx
-
MD5
da1f26afd43c51be872cc8c7fba46015
-
SHA1
5f40f4a20f8d904920ee1009b7ac42357da9177a
-
SHA256
7b96bf5c721509520772201b9457f7e8f844ad8642433895425e578c1d23e72c
-
SHA512
cec4a3be7511c12aed157efa83d4ceb647a5b8a431c51ac73b17648a8b6316a2342123cc4256e3ac5683d482368eb4e602cf5de7aceaabb2d382a409bb4f8bad
-
SSDEEP
6144:A/ACV4TCp2NtUoApUd47Bu7A7hAcX6GOSTd0CRd2SAz272EQNUOCgUma8oM0uCq:A/ACV4TcJpUcu7AaNGOS6CRbAIXR+U57
Static task
static1
Behavioral task
behavioral1
Sample
da1f26afd43c51be872cc8c7fba46015_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
vítima
mrerdem26.no-ip.biz:15963
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
5
-
ftp_password
ª÷Öº+Þ
-
ftp_port
21
-
ftp_server
ftp.server.com
-
ftp_username
ftp_user
-
injected_process
msnmsgr.exe
-
install_dir
install
-
install_file
svshost.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
Not fount APEX_release.dll
-
message_box_title
Error
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
da1f26afd43c51be872cc8c7fba46015_JaffaCakes118
-
Size
346KB
-
MD5
da1f26afd43c51be872cc8c7fba46015
-
SHA1
5f40f4a20f8d904920ee1009b7ac42357da9177a
-
SHA256
7b96bf5c721509520772201b9457f7e8f844ad8642433895425e578c1d23e72c
-
SHA512
cec4a3be7511c12aed157efa83d4ceb647a5b8a431c51ac73b17648a8b6316a2342123cc4256e3ac5683d482368eb4e602cf5de7aceaabb2d382a409bb4f8bad
-
SSDEEP
6144:A/ACV4TCp2NtUoApUd47Bu7A7hAcX6GOSTd0CRd2SAz272EQNUOCgUma8oM0uCq:A/ACV4TcJpUcu7AaNGOS6CRbAIXR+U57
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-