General

  • Target

    6f2aa5e723daa13afc5acd63c5d8f3a3_JaffaCakes118

  • Size

    289KB

  • MD5

    6f2aa5e723daa13afc5acd63c5d8f3a3

  • SHA1

    9c8d4215300588d9f3eb3c04710e6a49a8b94222

  • SHA256

    5f2bcaf977caecb81416d04f22079a47b6043bbb079484534d3e29711c528aca

  • SHA512

    a5e05f99fbec776b7fbc0974ca4b81e8000142494db211ec876917b603b072f98074c77cd7da8df0da8ceeb4d4ecac07e49c5a3de7270cd675d072027e6a221f

  • SSDEEP

    6144:WOpslERlquhdBCkWSzyEE81pjSKoW78U1bgibiDNX4w:WwslUTBJeH87GAf11beNX/

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.0

Botnet

remote

C2

46.118.186.231:1600

Mutex

C0X4Q372FQYET2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    5

  • ftp_password

    123581321

  • ftp_port

    21

  • ftp_server

    ftp.familiya.co.ua

  • ftp_username

    [email protected]

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Error

  • message_box_title

    Error

  • password

    1235

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6f2aa5e723daa13afc5acd63c5d8f3a3_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections