General

  • Target

    d06812c3db33b4c97fe5bb212556e28c_JaffaCakes118

  • Size

    289KB

  • MD5

    d06812c3db33b4c97fe5bb212556e28c

  • SHA1

    d43317d89438fc066944ad83a3b72b441bd68ee9

  • SHA256

    916ba309e40d7f1c2c806e2be13a510335a9ca617ad84179b26d46b54948a315

  • SHA512

    570c34ff94b47975330272d52d39de88725d44e35569f1097a6e57bd80463138d3324fc961c63437177ee109c94217770f3ff2e1827be68b4244953c25da38ff

  • SSDEEP

    6144:mOpslFlqyhdBCkWYxuukP1pjSKSNVkq/MVJbZ:mwsllTBd47GLRMTbZ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

kodeth

C2

kodeth.no-ip.biz:82

Mutex

040V3UW56AE4B1

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • password

    kokokoklkl

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d06812c3db33b4c97fe5bb212556e28c_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections