General

  • Target

    dbe1cad8b5e20356db3bad07164d5785_JaffaCakes118

  • Size

    280KB

  • MD5

    dbe1cad8b5e20356db3bad07164d5785

  • SHA1

    f265cef5eb30d67cb2021fcb5aa6106d75761960

  • SHA256

    278d6d7487614c52ea985eb84ff1c5052ccf946d781424f550e76eb25e376e3e

  • SHA512

    e2e49fa3b59627d756e6997742fae19e902c1bb7a7d58b31c82a5ce3400e2a005b873c8b9c85a0091c4ab17475cc8eabff120ed6e2c17bb681aa0ee4c756c36b

  • SSDEEP

    6144:pSNIWJ2m7gH1a1SDK4Bp4p1l6UCXMQudBc3oHnOZ5:0NP2m7Qa1SeWp49TdBUoHnOZ5

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v2.5.0.1

Botnet

remote

C2

rookster123.no-ip.org:1405

Mutex

0JNEM4OWEM5X0A

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    system92

  • install_file

    config.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dbe1cad8b5e20356db3bad07164d5785_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections