General

  • Target

    972df274f4ff153062e0d9d77de6209d_JaffaCakes118

  • Size

    333KB

  • MD5

    972df274f4ff153062e0d9d77de6209d

  • SHA1

    70ce377103e4f6156840e8498894646c401fb5b9

  • SHA256

    225439225682d9575af6c27de42d933d559e194d271d142a1447610ca98e155d

  • SHA512

    acc9832ee39d7f2165ede524446386718551d0915a2fb5a70878c65e26a8754c1f5d2f6e1e3440e411e0c8c1d716de37750c057d374cd08b42910354a4948c75

  • SSDEEP

    6144:wmcD66Rh5JGmrpQsK3RD2u270jupCJsCxCTIJMB:5cD666Z2zkPaCxO

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

sytem32

C2

xs0.no-ip.biz:81

Mutex

x90dm0!dxx0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    60

  • injected_process

    explorer.exe

  • install_dir

    online

  • install_file

    flashplayer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Required file comd32.dll is missing

  • message_box_title

    File missing

  • password

    rayabc123

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 972df274f4ff153062e0d9d77de6209d_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections