General

  • Target

    a1d030b86624befc05705a7442b7ea56_JaffaCakes118

  • Size

    284KB

  • MD5

    a1d030b86624befc05705a7442b7ea56

  • SHA1

    3b6150f1a5690243318948aa3635523136bc69af

  • SHA256

    ce97507b891cee50c28ecb96953857557b85222b8ff6c4e830276d3298ee4d6f

  • SHA512

    f5f8895e21eedce0192190cd7e27d6d8f5f2c0e6fe7896d75678568240e17b8583de00c76d5eb8aa36333522c7c024e5c2980b70e759f77de32a9dbde84ed5e8

  • SSDEEP

    6144:Jk4qmq1gfNjIumJYfoWP3+ERjeGxFIs/OiDIQNsWY:O9PCIPO3+EAGxann

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

zahinoss.no-ip.info:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    123

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • a1d030b86624befc05705a7442b7ea56_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections