General

  • Target

    2fa74d52126451db17ba85db87366e6d_JaffaCakes118

  • Size

    296KB

  • MD5

    2fa74d52126451db17ba85db87366e6d

  • SHA1

    70be1ea8804b2f9fb68dfddf77c7398a233ffa51

  • SHA256

    c145bed484e53b57f3531fa56611405ebe8d8056b1d3b7aa3f5efc76f4b677fe

  • SHA512

    a9db06965f51758c2ac54e82aebf0f39e69848dadec071a847a2b0185543265c4335ef43324dc1a14ff6294fb8ea0f03d22b9e0e3c912998d8ea3133abd8d0f0

  • SSDEEP

    6144:fOpslFlqRhdBCkWYxuukP1pjSKSNVkq/MVJbf:fwslETBd47GLRMTbf

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

px.serveblog.net:100

Mutex

OUYV058Q8O8141

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Beta Server currently unavailable try the WebClient

  • message_box_title

    PwnXile

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2fa74d52126451db17ba85db87366e6d_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections