General

  • Target

    3f61a4b0822a9ef9198401a71117e32e_JaffaCakes118

  • Size

    321KB

  • MD5

    3f61a4b0822a9ef9198401a71117e32e

  • SHA1

    914e564366bd31caf50ab11ce2eef17f23dceba2

  • SHA256

    9343e213864b8d7551bc30a649b92b688fdf749b3fd5683f29d234cf3f08ea7e

  • SHA512

    9de5c205c6a8a88cdc9155335e925b74532188452b6eb51192a4c9e3a59891fe98c2b1c1a44629bee86a3c7f6e96fde789801194b92ff2d0441ab6188803f0f2

  • SSDEEP

    6144:Yk4qmti76h5yQdJEjSwDoXF0PPouM2GjBaDtf6MYK36z0lrsoK:j9Z6dJYSERzM2GG9lrsJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ISRAEL

C2

Mahmoudzoroo.myftp.biz:1988

zoroo.myftp.org:3688

Mutex

***Mahmoud***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    Microsoft.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Silverlight error message ErrorCod:40001 ErrorType:DownloadError Message:AG_E_NETWORK_ERROR

  • message_box_title

    Windows Internet Explorer

  • password

    361988

  • regkey_hkcu

    HKCU

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 3f61a4b0822a9ef9198401a71117e32e_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections