General

  • Target

    c015f88de478c123406e1799c71f2c87_JaffaCakes118

  • Size

    281KB

  • MD5

    c015f88de478c123406e1799c71f2c87

  • SHA1

    c206779b71703e947a62734da175da85af7fa515

  • SHA256

    1f3039f19885f8c92dc13ebda5f984eb547b322ac64ae4102f0f25fd0087e452

  • SHA512

    06bc3a4d1ce7b1a7f4618aef6e2806e57ef85c5c563d0553ec514bd0ac8acb3178d5e3bc3615ceba2fd00d58b9268716548f81c5556121a5de8f5e4271a9ac81

  • SSDEEP

    6144:gScrLh4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXij5:xcGy78QSVnNyhsFMCeSj5

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Trial version

Botnet

remote

C2

xxl.no-ip.info:81

127.0.0.1:81

Mutex

G046PL7OX62HV4

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c015f88de478c123406e1799c71f2c87_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections