General
-
Target
JaffaCakes118_aefb1c44ab70c768b810ca89db9c4ad0
-
Size
282KB
-
Sample
250118-t43y8syrdk
-
MD5
aefb1c44ab70c768b810ca89db9c4ad0
-
SHA1
a13beefa58c5bce884669bd03428d8f6df27b9bf
-
SHA256
2370c92ea73767ea1885fbf3cc7aa4cff87738baba2d91e7a5baba0989520a08
-
SHA512
14a03f7eb3d0134d16af62aa4c3ef6c96e0fa4d8d762e99cf2c232058fbe827cd9b5538adeddb4447495eb3230b39d86056bebad37ad5cbad99135b7f1bcb28d
-
SSDEEP
6144:Ys9tZzqipnaRoxDNT/xQphU+jrlgzfuzt91C9NDyWId98HhqbxtHGZo:zttwR4h/xQp6+tqOYy9zo01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aefb1c44ab70c768b810ca89db9c4ad0.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.02.1
PORTA 80
wesleyy.no-ip.org:80
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Pluguin.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
12345
-
regkey_hkcu
Avirnt
-
regkey_hklm
Avgnt
Targets
-
-
Target
JaffaCakes118_aefb1c44ab70c768b810ca89db9c4ad0
-
Size
282KB
-
MD5
aefb1c44ab70c768b810ca89db9c4ad0
-
SHA1
a13beefa58c5bce884669bd03428d8f6df27b9bf
-
SHA256
2370c92ea73767ea1885fbf3cc7aa4cff87738baba2d91e7a5baba0989520a08
-
SHA512
14a03f7eb3d0134d16af62aa4c3ef6c96e0fa4d8d762e99cf2c232058fbe827cd9b5538adeddb4447495eb3230b39d86056bebad37ad5cbad99135b7f1bcb28d
-
SSDEEP
6144:Ys9tZzqipnaRoxDNT/xQphU+jrlgzfuzt91C9NDyWId98HhqbxtHGZo:zttwR4h/xQp6+tqOYy9zo01
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-