Behavioral task
behavioral1
Sample
473ae0e1a6df415e6b54cf91e9dc6ff2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
473ae0e1a6df415e6b54cf91e9dc6ff2_JaffaCakes118
-
Size
339KB
-
MD5
473ae0e1a6df415e6b54cf91e9dc6ff2
-
SHA1
ef947fc24218742e8edf59630af90d03ed2a16ee
-
SHA256
ecaf5b06db4b979954060a1c9bedaa0c7633725ce8e4b5cebfb7a5ca4ae59933
-
SHA512
d1f0c5e235c1b890963f0cad40b7e8c991aa84bce46ab0a19683652aedc54d00142d689e198271411e56b2b82b347b0eed2b28aece394c9d562cf27b209b22b1
-
SSDEEP
6144:JcOpsllhdBCkWYxuukP1pjSKSNVkq/MVJbZIoy6J:6wsllTBd47GLRMTbd
Malware Config
Extracted
cybergate
v1.07.5
remote
127.0.0.1:892
HGR6F4B40T5Y57
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Signatures
Files
-
473ae0e1a6df415e6b54cf91e9dc6ff2_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 268KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE