General

  • Target

    8c282f0dac553cb2883715640d2a4746_JaffaCakes118

  • Size

    296KB

  • MD5

    8c282f0dac553cb2883715640d2a4746

  • SHA1

    3b867e1306fe3bb077d9c09d33a067f29698ad5e

  • SHA256

    7b19bb260d0bf14e94b980d488600fc0cfe665a7c11e52eb8ae58aa148a80c85

  • SHA512

    ea9a53110c9a10b6972e0317caa36a24d0b593e7215135959ffbb66b6242d7887412689ad38214a05acc78832d3b0ea49870ba11a2091002627b04195937157b

  • SSDEEP

    6144:/OpslFlqNhdBCkWYxuukP1pjSKSNVkq/MVJb9:/wsl6TBd47GLRMTb9

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:82

Mutex

LG1MV10B1VJ53Q

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8c282f0dac553cb2883715640d2a4746_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections