General

  • Target

    3a8f8fd616ea3132582c4855b4409b64_JaffaCakes118

  • Size

    391KB

  • MD5

    3a8f8fd616ea3132582c4855b4409b64

  • SHA1

    a518a5230bbca440bddb442b12aab1634c914822

  • SHA256

    20f5d952514fd97f635672592b6b4ca66086f89cda2bfc851e6cc9d5b783dcb1

  • SHA512

    196d059419bb9a092b082a28bc14ab3d5ba8139a3e07b42755dfe5a7211e7e5d1a37295bc8c0fdac7e335ff4678f50dc5b98b93fb42566cae7eeb9d6b3485728

  • SSDEEP

    6144:5OpslERlqhhdBCkWSzyEE81pjSKoW78U1bgibiDNX4o:5wslHTBJeH87GAf11beNXz

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.0

Botnet

remote

C2

esam3at.no-ip.biz:246

Mutex

W25020Q2UH182R

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1234567

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3a8f8fd616ea3132582c4855b4409b64_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections