General

  • Target

    ea3ac84cb52c2911921c57579c8d50ed_JaffaCakes118

  • Size

    284KB

  • MD5

    ea3ac84cb52c2911921c57579c8d50ed

  • SHA1

    6c7c9c44603b460afb1802dd765840924ae0b928

  • SHA256

    502751001f67f95a853c1c3b90ca9035259df357ae1c2321f6a6237fa602c3b7

  • SHA512

    f4b068d0d888d334bcdc41212834fc91835331b5f16e743e9cd84fcc157b463768462df486e94d7769802673125157306b15718294c976314c7be5ce991aed0d

  • SSDEEP

    6144:7k4qm94Z6obFNOKoeIK+kAkszCugupptMnEWyl0+K5:A984NXOKoeKkKzCug0Oncl0+

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

192.168.1.6:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • ea3ac84cb52c2911921c57579c8d50ed_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections