General
-
Target
JaffaCakes118_b06d93c7e23d1fe35a6220d76b72a206
-
Size
396KB
-
Sample
250118-we61pszje1
-
MD5
b06d93c7e23d1fe35a6220d76b72a206
-
SHA1
b6db75e16d24dcef24808ab08c5f5ebde8c8ed4b
-
SHA256
4f0ca3ad6df8a4751064e16811ea5c1520ac6baf5fc967365fc2ae99ec875334
-
SHA512
f11d0b3e94d1487b848e0478ed7537b3323842cbff1d0619351ebbed4d2826497ac2a84f055bff4ade2d485c1f30a419b41744f9e9e8e3ac7fe2294c376b6925
-
SSDEEP
6144:9O3BVWHTfLM7wLPDKkPxkRLp0FyE0OCAsLBO515NkfyIQdSKmwEbfiVMsR4CFZ:9O3BVaTfLYSGG4uUhAsg4Am/TiICX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b06d93c7e23d1fe35a6220d76b72a206.exe
Resource
win7-20241010-en
Malware Config
Extracted
cybergate
2.6
user
homar22.no-ip.biz:81
homar22.no-ip.info:83
***yaser***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
sweet.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
yasxyas
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_b06d93c7e23d1fe35a6220d76b72a206
-
Size
396KB
-
MD5
b06d93c7e23d1fe35a6220d76b72a206
-
SHA1
b6db75e16d24dcef24808ab08c5f5ebde8c8ed4b
-
SHA256
4f0ca3ad6df8a4751064e16811ea5c1520ac6baf5fc967365fc2ae99ec875334
-
SHA512
f11d0b3e94d1487b848e0478ed7537b3323842cbff1d0619351ebbed4d2826497ac2a84f055bff4ade2d485c1f30a419b41744f9e9e8e3ac7fe2294c376b6925
-
SSDEEP
6144:9O3BVWHTfLM7wLPDKkPxkRLp0FyE0OCAsLBO515NkfyIQdSKmwEbfiVMsR4CFZ:9O3BVaTfLYSGG4uUhAsg4Am/TiICX
-
Cybergate family
-