General

  • Target

    3dc69abff6d7cc3195afb904743aadcd_JaffaCakes118

  • Size

    316KB

  • MD5

    3dc69abff6d7cc3195afb904743aadcd

  • SHA1

    52dc4bde819b35e29db220c41de77db4e809051a

  • SHA256

    9f1f5825abc813a9b858e1b42fe84b1f22eee9168103062f8b72a448617d3622

  • SHA512

    8bd665c3b2d03ca47ed43cc78c681f5c7eb002bbd3daa926089ee43e5f6ab2b5c5560a0e1a0f8739fa2e5d0af304fee4e60d5e9e782d54b660668c7e41c558e6

  • SSDEEP

    6144:cOpslFfhdBCkWYxuukP1pjSKSNVkq/MVJbw:cwslZTBd47GLRMTb

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Hic

C2

hicjobs.no-ip.biz:100

Mutex

155VUE4QI205FP

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Hic

  • install_file

    Hic.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    INVALID MEMORY !

  • message_box_title

    Hic

  • password

    0232

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3dc69abff6d7cc3195afb904743aadcd_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections