General

  • Target

    268b34f4bfd5bada95bd259fc47f51eb_JaffaCakes118

  • Size

    289KB

  • MD5

    268b34f4bfd5bada95bd259fc47f51eb

  • SHA1

    b2373e475ae7374dc097a7ed7a60d6903227832d

  • SHA256

    a62682a9c8f3ecc94d92cbc6716a261fed80f9183c5756c3700ed803410d05f1

  • SHA512

    ef4610982a31f11775d12ce4b8344302393b6f16d2df635bb37a7e9e819a9e4d41427b1ca37d64f0ae9cb99345063da6de6aafb6ddbbcbef4ade93cd63dde369

  • SSDEEP

    6144:COpslFlqYhdBCkWYxuukP1pjSKSNVkq/MVJbs:CwslVTBd47GLRMTbs

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

C2

xxvinny.no-ip.org:82

Mutex

U26S61RGNEUC7Q

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinBooterr

  • install_file

    WinBooterr.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    10641vc

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 268b34f4bfd5bada95bd259fc47f51eb_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections