General

  • Target

    f311a4664bfec4dac6bacceaac198cde_JaffaCakes118

  • Size

    277KB

  • MD5

    f311a4664bfec4dac6bacceaac198cde

  • SHA1

    5143701faec33c5aa19ab88323e84fb4c224d38f

  • SHA256

    ef9ccca01ee595b7a0507bedf4f76e24f243411a28481affd3d3aaacfafcd54b

  • SHA512

    5d9a2da88fe9a1c68ca09d9dd467b146f0c70c9ecacdcc2c7b3b842ca652595e5c273827a9227b21a9c6685f64f2727e2d2eff492311481a534889590e2472e0

  • SSDEEP

    6144:0k4qmf5DpcnE5OAx90VZo0eiuQZ+hvpSMhvfuZhDvK:X9+ynSOW9Q5lqXhHg1vK

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 02

Botnet

vítima

C2

fox3li.no-ip.info:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f311a4664bfec4dac6bacceaac198cde_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections