General

  • Target

    5b56f157355cf8ba5320356f887b5358_JaffaCakes118

  • Size

    722KB

  • MD5

    5b56f157355cf8ba5320356f887b5358

  • SHA1

    201a13dd265a12e52cda28a7cd2400f3d748178e

  • SHA256

    4134472484f82d95c9882ed8ac514b0cfe85d00d3d04d44b6b7d900d6dfef339

  • SHA512

    0fb6fc509c3b04da558a86c5b422a25a4eebf0a6625d8925b3536e07acf273e5badcdeaf2399a8fb7d638aba3656365d3b76faf9feaff3793fd761745325f73c

  • SSDEEP

    12288:ncD66ofwF15Q4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzH:nzfgzLtwCc26uGi2VCHXSBzTaDMsAQRk

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

ariatri

C2

190.38.122.110:2000

Mutex

thk159

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./mamatekiero/

  • ftp_interval

    30

  • ftp_password

    darkgabriel

  • ftp_port

    21

  • ftp_server

    ftp.drivehq.com

  • ftp_username

    firefoxgabriel

  • injected_process

    explorer.exe

  • install_dir

    win32

  • install_file

    hola.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123456789

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5b56f157355cf8ba5320356f887b5358_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections