General

  • Target

    fcbcb3f2371d6bd21d02bfe36bcc2ca3_JaffaCakes118

  • Size

    281KB

  • MD5

    fcbcb3f2371d6bd21d02bfe36bcc2ca3

  • SHA1

    6a5d998059a7f95fbc92248d3a81065e991f0dd7

  • SHA256

    587a72088da1583722e1ee819511051d20e113b501c381041cb4965755a049a8

  • SHA512

    ab7e98dab2a7b313d64a39fe6c680a615b03ad9ab2ede16ddceb7c639b5c026b38cf407012344de8cfecc742eaf01919be9fc8d8729f89594d99c8967d3c1814

  • SSDEEP

    6144:gScrLP4mp8D6WGc/YSlIipBReubLzeh7Yy0DXNe0OjrFDvlG:xc4y78QSVnNyhsFXNujRvE

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

dfuso.zapto.org:15966

Mutex

DGUH4X41T1IOR4

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fcbcb3f2371d6bd21d02bfe36bcc2ca3_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections