General

  • Target

    b162a2ace62e9c444530766a06594f21_JaffaCakes118

  • Size

    296KB

  • MD5

    b162a2ace62e9c444530766a06594f21

  • SHA1

    4521ed866c1d42ceb2fccd1c92918856e67b11ea

  • SHA256

    1b9b253391ff900c0662630ae4871551e1f0adb988eb675f0f53a33b54b891e7

  • SHA512

    007c40c53804a485312abb20b7257e1c9d086f2d9ae0e505e9232c77fb0cd3e22c98804d1ae0238feedf03e8ec11d30bd191e41554bf27102c7e952dfa42ee2e

  • SSDEEP

    6144:POpslFlqrhdBCkWYxuukP1pjSKSNVkq/MVJbm:PwslWTBd47GLRMTbm

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

rajan99981.zapto.org:6677

Mutex

HMD36SN6R647NV

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Path Could Not Found.

  • message_box_title

    System Error

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b162a2ace62e9c444530766a06594f21_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections