General

  • Target

    4c1f4c52339d1b2ff48bea23e65443b4_JaffaCakes118

  • Size

    293KB

  • MD5

    4c1f4c52339d1b2ff48bea23e65443b4

  • SHA1

    3446f4db300841df16790aee8a52a36cf3c9af7f

  • SHA256

    30e686124336f4f8c54e55d9e850115bc134ae48c7678e24b25f90128290fab8

  • SHA512

    eee1b04f1d05871b4d879963c9a50b13cb4c59869c865138c10fc50a711fe8bf9815dc7389f02f6deafd6d2588d6a201c525fd9baf625a85d725989ef37f6e5e

  • SSDEEP

    6144:PmcD66RRjH5JGmrpQsK3RD2u270jupCJsCxCi:ecD6632Z2zkPaCx7

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

whyzzz.no-ip.biz:246

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    it's not working....

  • message_box_title

    messege from administator

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4c1f4c52339d1b2ff48bea23e65443b4_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections