General

  • Target

    0db2305ce60994f118c0f8f2434f989c_JaffaCakes118

  • Size

    281KB

  • MD5

    0db2305ce60994f118c0f8f2434f989c

  • SHA1

    5c3b573a864c0b8d3c679d3e74837bfbd94b670a

  • SHA256

    91ccc22e7393b1c793f547dcdd4c51b94ae267eb0c6cfa32e7dc80f64c491204

  • SHA512

    a1c9400ccb564e1c4be189169dd429f1b648f12a464aa1296827a35e31458e30587152d89baaf75f05d54be305a27c5470b9bb8e7257338351259b2e5d7872df

  • SSDEEP

    6144:+y+pV4TwlTLfkixFUQKf3D7TnBAZ5qhbxi:7+p60lYixsfvDBAzK9i

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.11.0 - Public Version

Botnet

Microsoft

C2

127.0.0.1:999

Mutex

RM1851027266XB

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./htdocs/RAT

  • ftp_interval

    30

  • ftp_password

    azerty12

  • ftp_port

    21

  • ftp_server

    ftp.byethost5.com

  • ftp_username

    b5_6687336

  • injected_process

    explorer.exe

  • install_dir

    Microsoft .NET Framework

  • install_file

    login.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    c123x

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0db2305ce60994f118c0f8f2434f989c_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections