General

  • Target

    fe72ef7b7981b8b3f0c38856e06ec673_JaffaCakes118

  • Size

    345KB

  • MD5

    fe72ef7b7981b8b3f0c38856e06ec673

  • SHA1

    03032a057b7518594374cb59d4a1daf016d951e9

  • SHA256

    774d14fe46b40fb8017b7294fab74a81a166593e2adcaa19a76f8ceaca0e92ad

  • SHA512

    da2d03be84a9b29e5e37a85dfb3337824e7e3f7d81ac46c1045cec070aa1a504fc256bd33afb1720c090050e266ce66522a8b5ba9f2752965b149c8852c9666b

  • SSDEEP

    6144:lmcD66Rd5JGmrpQsK3RD2u270jupCJsCxCDIKcC:AcD66+Z2zkPaCx4c

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

rochdi.no-ip.org:5050

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    system32

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fe72ef7b7981b8b3f0c38856e06ec673_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections