General

  • Target

    002b0e19a772859005c04c29ab38dfa7_JaffaCakes118

  • Size

    295KB

  • MD5

    002b0e19a772859005c04c29ab38dfa7

  • SHA1

    58535d6e2a18139080ee3089b1b9fc8998b90ee0

  • SHA256

    c6bf2332ee4916af76f805b880ae7f479fd3c2b15ab04b7adfd00d6c0c71f8ce

  • SHA512

    d48112e23aa6224fd03250a0359f1c79c15f7aec7a9efd5f55d663dda3290ef20da77a410e3f80aa11541a6ff84b43e18120d5cee364e66cfc0d31408091cdf1

  • SSDEEP

    6144:nmcD66RRjv5JGmrpQsK3RD2u270jupCJsCxCG:mcD663OZ2zkPaCx/

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

bladez654321.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    .//

  • ftp_interval

    5

  • ftp_password

    bajs654321

  • ftp_port

    21

  • ftp_server

    ftp.drivehq.com

  • ftp_username

    bladez4321

  • injected_process

    winlogin.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 002b0e19a772859005c04c29ab38dfa7_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections