General

  • Target

    138c85e6fa97d7e6df8cb9e664fb3ad3_JaffaCakes118

  • Size

    283KB

  • MD5

    138c85e6fa97d7e6df8cb9e664fb3ad3

  • SHA1

    86ceb27fd85d01139fceac34e27619b4555e5326

  • SHA256

    dd0f2d74dcc9fcfc837305a0cd64c2ea63cee4c6509849fc0f17a6fd9623805f

  • SHA512

    6fedefe385972aa72c986f4f92b2fda9549e7b649b716b94fd30b31c781a5ccd5a15e16f2f08f83ce52630607341d0ca8001c25dedf5ba89a320758fd4e184ca

  • SSDEEP

    6144:A4ABF+CpAuO/50BTnqPd0Mpz7qhh4nXjjf8MZ9BKXK:vUUGLE0kuGnESB

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

remote

C2

127.0.0.1:999

Mutex

38OQ1144833Q51

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 138c85e6fa97d7e6df8cb9e664fb3ad3_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections