General

  • Target

    42d3233ff212afc855dda84dbb04711a_JaffaCakes118

  • Size

    376KB

  • MD5

    42d3233ff212afc855dda84dbb04711a

  • SHA1

    4e4d0e5c3a8c29951ff1581066515e331e202456

  • SHA256

    4a46c1be992fe1db4ecca61b1d575fa49ee1b06f6a230281043d560138a8c88c

  • SHA512

    06175393eb5e52d6c2874565a77a5c300d6d15eaa2591a08ef3c603022027120afa4ce77d59e600bf93597795648a62e9c21ca16156417b7215affd948ada6a4

  • SSDEEP

    6144:+i3Vg5Fz43yIHKeDWDJI/ViV3SVGEej55E7Y7cDIMLDP0AN57tWqWu7zBv1gBedP:vsp4PTS3ARIE7YZMvP5EuoAdL3

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

remote

C2

slashx2012.zapto.org:81

Mutex

CURB550J88H03R

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    SystemUp

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    ouday

  • regkey_hkcu

    SystemUpgrade

  • regkey_hklm

    SystemUpgrade

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 42d3233ff212afc855dda84dbb04711a_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections