General

  • Target

    e9a284dab8128f5dcdacb15305d7cc1c_JaffaCakes118

  • Size

    296KB

  • MD5

    e9a284dab8128f5dcdacb15305d7cc1c

  • SHA1

    600c81170f9260c82d80b1af8653855d034776b1

  • SHA256

    6b28045633140184f9bc67b77b8d54c81d8ccbb7b35559f9bcdf630ac356ffca

  • SHA512

    202b1141b2e5efb1325078729a8e03bf7304c2dcc5c00117e9d3a2538f4f38e270f0335e2b73fe086f71f68cd47c58187f5d7a9946ce1122de37c326915fdc4e

  • SSDEEP

    6144:/OpslFlqWhdBCkWYxuukP1pjSKSNVkq/MVJbJ:/wsl/TBd47GLRMTbJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

gr.no-ip.biz:83

Mutex

CyberGate1

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e9a284dab8128f5dcdacb15305d7cc1c_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections