General

  • Target

    340be4b25fd289e73bf7f9b81788279d_JaffaCakes118

  • Size

    665KB

  • MD5

    340be4b25fd289e73bf7f9b81788279d

  • SHA1

    d0e3a33e522a4fe9639d37b7846e0749045de484

  • SHA256

    67619a3778ef72365c75f339fb4fa40472da43e243802d7d82703e8fe2529704

  • SHA512

    f855fd7660abe866de0f74ec04169ee33ce856edf621ae393f012bda389d6684b2293d66989f746019a32a3c9603e37cb67c8b71b4360cd54cf17bad4d4b6221

  • SSDEEP

    12288:ncD66XQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQR:n8LtwCc26uGi2VCHXSBzTaDMsAQR

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

127.0.0.1:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • ftp_password

    123456

  • ftp_port

    21

  • ftp_server

    ftp.server.com

  • ftp_username

    ftp_user

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 340be4b25fd289e73bf7f9b81788279d_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections