General

  • Target

    78b88cacd978dcfce7591e2cab01d2d0_JaffaCakes118

  • Size

    290KB

  • MD5

    78b88cacd978dcfce7591e2cab01d2d0

  • SHA1

    1962bae7295491aca0255abf300fa6d6b1ebfc55

  • SHA256

    b56be6c595ad081d1d8fe07babb771d4fb5ede764399c5be9b115e85ae83c3c9

  • SHA512

    9b48d9f9ad263f00d79a030559221c9b2ade91500f065f7ab820af65c79004a77e47fb1ef7fe9c0ee0328159353c8cbbca4a059915ced5408d3e2138e789dcc5

  • SSDEEP

    6144:4mcD66RRjC5JGmrpQsK3RD2u270jupCJsCxCy:RcD663bZ2zkPaCxX

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

guarkull

C2

your_dns_here:81

127.0.0.1:81

127.0.0.1:80

83.32.215.246:81

83.32.215.246:80

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    5

  • ftp_password

    12345678

  • ftp_port

    21

  • ftp_server

    www.0catch.com

  • ftp_username

    guarkall.0catch.com

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    eferal

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 78b88cacd978dcfce7591e2cab01d2d0_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections