General

  • Target

    188b07a891a3696e825317c3d0c0bd1c_JaffaCakes118

  • Size

    346KB

  • MD5

    188b07a891a3696e825317c3d0c0bd1c

  • SHA1

    7accf90ac645d4fc51f149fb24f67c8459a36d6b

  • SHA256

    51c56999d50d44792502d0744043b6e3f83da74a22e9ddee942c9add0548a40e

  • SHA512

    2d74999ebc57316b2de79c9eeda4c1c2624b06ec83720e19e42b6fdb3be0192357cc19fc34048cc1dae5cc5e297aa7af6756162c3276c42eb15dbf0c3ef61337

  • SSDEEP

    6144:gScrLA4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXij:xc/y78QSVnNyhsFMCeSj

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

ali70.no-ip.biz:999

Mutex

X7HITN3M6M86O0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    rety

  • install_file

    massnger.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 188b07a891a3696e825317c3d0c0bd1c_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections