General

  • Target

    30271de6018812e241baacc1dde6ec0a_JaffaCakes118

  • Size

    281KB

  • MD5

    30271de6018812e241baacc1dde6ec0a

  • SHA1

    8a63822cd375ba578f3e3815ea11078a5563f459

  • SHA256

    d95869e0966b7391c9b89910a3b3208c18a2f7e68a3f7bc4ca66c34eb02076c4

  • SHA512

    60aaf9e649a378e893b51cd77c1e7091bf45d984a0edc309bed4b658557960b8a53fd1e217ada6098b1ccd7fd9d59d11523561098d1744b0aeedb734826e25cd

  • SSDEEP

    6144:AScrLC4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijx:Rcdy78QSVnNyhsFMCeSjx

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Trial version

Botnet

remote

C2

127.0.0.1:999

Mutex

ESXU2NE88RQP02

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    hi................

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 30271de6018812e241baacc1dde6ec0a_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections