General

  • Target

    d30c3178def6d1bc16fd4d756a0f1886_JaffaCakes118

  • Size

    296KB

  • MD5

    d30c3178def6d1bc16fd4d756a0f1886

  • SHA1

    8855dc679ca6b5dc134a8f6d3e8d2d5a968e36fa

  • SHA256

    0db14133c54ae058b71aa3310fba8a5b99050aed0964660f1be10b672ac2c0a9

  • SHA512

    13067fe9f35b72064e076c791930e322970dc80974854cbe1b817a19d0915d15d1c45a6e14618a2c838d4f3bb9d4ea0f7189d82fbfe7849dbda9844d4cb396ac

  • SSDEEP

    6144:fOpslFlqWhdBCkWYxuukP1pjSKSNVkq/MVJb1:fwslDTBd47GLRMTb1

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

localarea.redirectme.net:999

Mutex

B4O33QB53W4JH2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    rundll

  • install_file

    rundll32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    akubest

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d30c3178def6d1bc16fd4d756a0f1886_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections