General

  • Target

    633a0a0a6b62636cf8fca7f1e7a23c29_JaffaCakes118

  • Size

    284KB

  • MD5

    633a0a0a6b62636cf8fca7f1e7a23c29

  • SHA1

    ddd5183581aa06da7fb65cc42b565a6feec85cf1

  • SHA256

    e950ca592a41d3affcaf6426dd59f4872069b194d3a00a809ab861dd1bfb23e7

  • SHA512

    8d8de7262edbbd98561083ae4497c29ebc38061f6e5da52acd76ec0c1db639a61314db71eff26a7a5461497d7095d5d1e2fe4194d81cb40f812f8834d046df2a

  • SSDEEP

    6144:Wk4qmZYZ2Psz1lQkURgVdFjSr840uVQbYMQje8YtYANsKKbwsi/:p9+Lsz1lrFIwsebYrjr6hgD

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

hack-me.no-ip.biz:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    rappelz

  • install_file

    rappelz.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    please try again later

  • message_box_title

    Error client

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 633a0a0a6b62636cf8fca7f1e7a23c29_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections