General

  • Target

    315c6c309e9cdb6037e4c9a46a4b6e20_JaffaCakes118

  • Size

    296KB

  • MD5

    315c6c309e9cdb6037e4c9a46a4b6e20

  • SHA1

    59171fdea526fc9311a9041f1e7057acfeb67470

  • SHA256

    de178a05857035307d46197102bc8b419de1d0982874300a60aebad8e8b446c8

  • SHA512

    9955c44fa938a260f990b4424f0ba7228b27f5ef208141e062be92a4e37fbe512a21751af7038c2ead944bb04c874b39f3607821f8796da3c1c096ccd92acea4

  • SSDEEP

    6144:fOpslFlq8hdBCkWYxuukP1pjSKSNVkq/MVJbD:fwslRTBd47GLRMTbD

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

C2

aidsvlek.no-ip.org:3080

Mutex

0S3ALES30U6RT6

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server4.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    26112004

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 315c6c309e9cdb6037e4c9a46a4b6e20_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections