General
-
Target
JaffaCakes118_08b6ebf7fec049e9ba2ac2c4ca6bfc0a
-
Size
965KB
-
Sample
250220-bb5m9avlw7
-
MD5
08b6ebf7fec049e9ba2ac2c4ca6bfc0a
-
SHA1
355ce513c1c0093c57c82406460157a94c1d4e6c
-
SHA256
ed672bff6e06847a1667b764e776bef664286cb5a67e366db89bbc97025c4062
-
SHA512
44fe1780ab238a08dfdca9473af29edb2162b76385571cd1eab167fa0fe0aaf1d0febbf73395d23957c5c4829f593a084efdc344a9ac9dab721fdf4df0bdf9e9
-
SSDEEP
24576:ARmJkcoQricOIQxiZY1iaEy7W4bevfero0zK:1JZoQrbTFZY1iaE54bevfAzK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_08b6ebf7fec049e9ba2ac2c4ca6bfc0a.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.02.1
xXxNubxXx
taliban.no-ip.org:81
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
System32
-
install_file
wuauclt.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
123
Targets
-
-
Target
JaffaCakes118_08b6ebf7fec049e9ba2ac2c4ca6bfc0a
-
Size
965KB
-
MD5
08b6ebf7fec049e9ba2ac2c4ca6bfc0a
-
SHA1
355ce513c1c0093c57c82406460157a94c1d4e6c
-
SHA256
ed672bff6e06847a1667b764e776bef664286cb5a67e366db89bbc97025c4062
-
SHA512
44fe1780ab238a08dfdca9473af29edb2162b76385571cd1eab167fa0fe0aaf1d0febbf73395d23957c5c4829f593a084efdc344a9ac9dab721fdf4df0bdf9e9
-
SSDEEP
24576:ARmJkcoQricOIQxiZY1iaEy7W4bevfero0zK:1JZoQrbTFZY1iaE54bevfAzK
-
Cybergate family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-