General

  • Target

    648af4e4bf57d87a9949c6db14a48608_JaffaCakes118

  • Size

    281KB

  • MD5

    648af4e4bf57d87a9949c6db14a48608

  • SHA1

    aaeebb458609fdc20ad53b6da0e12f5c528a61b0

  • SHA256

    5ac7446845bba058b66803911f880a3392156da1b2a579b711867666512c9c78

  • SHA512

    66f32fb07049771accdb4bccba9418e4cb4bbee6aa0514c797cba8c63ed6b44735bedb4258bca2d2a504860a6c5aa88eed1f84319fd514fb82994bd944fd519d

  • SSDEEP

    6144:ey+phLTwlTLfkixFUQKf3D7TnBAZ5qhbx8:b+p10lYixsfvDBAzK98

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.11.0 - Public Version

Botnet

remote

C2

127.0.0.1:81

laxlog.no-ip.biz:81

laxlog.no-ip.biz:3737

Mutex

10OKX5L22440R7

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    axis

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 648af4e4bf57d87a9949c6db14a48608_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections