General
-
Target
JaffaCakes118_18f99a12f22126a4ccd0cdc73b4b792e
-
Size
392KB
-
Sample
250123-ttj4dawrbn
-
MD5
18f99a12f22126a4ccd0cdc73b4b792e
-
SHA1
4e64be6fdb8402e67aedc25af50b350f556bd55c
-
SHA256
38f82b6ce1dea5169ddfffba456d12a7858301e700dad4b792c4757e488a01cf
-
SHA512
fc27c18023265cf3afe0962df46119ef0b5d114c363f2f61428cdb508a69bbd20e1688c9f8307f4b6b9ea17d54e174ada46c9b613d298303af2b4f9d7dbc9875
-
SSDEEP
6144:bcMqWu2qQ8N1UUJvAO03vM/6DBsKZfD0X8OoDntRVBdyXj6eyGirXGzYMUrt:QM82qQ8BAH3E/iBsxotRxC2t
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_18f99a12f22126a4ccd0cdc73b4b792e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_18f99a12f22126a4ccd0cdc73b4b792e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cybergate
2.6
Dragon.Boss
127.0.0.1:81
steam21.zapto.org:81
***MUTEX1***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
windows
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_18f99a12f22126a4ccd0cdc73b4b792e
-
Size
392KB
-
MD5
18f99a12f22126a4ccd0cdc73b4b792e
-
SHA1
4e64be6fdb8402e67aedc25af50b350f556bd55c
-
SHA256
38f82b6ce1dea5169ddfffba456d12a7858301e700dad4b792c4757e488a01cf
-
SHA512
fc27c18023265cf3afe0962df46119ef0b5d114c363f2f61428cdb508a69bbd20e1688c9f8307f4b6b9ea17d54e174ada46c9b613d298303af2b4f9d7dbc9875
-
SSDEEP
6144:bcMqWu2qQ8N1UUJvAO03vM/6DBsKZfD0X8OoDntRVBdyXj6eyGirXGzYMUrt:QM82qQ8BAH3E/iBsxotRxC2t
-
Cybergate family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-