General

  • Target

    64fd24fe2791c59e9da7b719364b4a76_JaffaCakes118

  • Size

    378KB

  • MD5

    64fd24fe2791c59e9da7b719364b4a76

  • SHA1

    7b39cbd273d5c8f47b75d215e781f590e6043f40

  • SHA256

    9180ba5362b2222e4534bd99b4dd4545f9813cccb2fdb4bd31aa8e9850dfd40d

  • SHA512

    916d371f78d01f3bd0b51a4249c4a34ff6106a614f82b9694bbcdacf36c5a66b8e180021bae2bc27ca6b30365e76c5322096d6f7978d585c91b6ed1e478bf4b2

  • SSDEEP

    6144:POpslFlqYhdBCkWYxuukP1pjSKSNVkq/MVJbRDUeaWjyXs84b:PwsllTBd47GLRMTbRDUeN84b

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

h3x4

C2

computertech.no-ip.biz:5555

Mutex

R5E63QYE7YAXP5

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    h3x4.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    h012345

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 64fd24fe2791c59e9da7b719364b4a76_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections