General

  • Target

    42c1af434ab2d1f4b219cb5976c05b89_JaffaCakes118

  • Size

    283KB

  • MD5

    42c1af434ab2d1f4b219cb5976c05b89

  • SHA1

    1f268c6ec47a952496df60474880bd5fc04bf4f2

  • SHA256

    708ca15a8994f8a0dee3e4a0aa48db29e104cceeb3ffce45cc1ae59c9503cd47

  • SHA512

    794441f777f63126af217d61a6d9bb6ba46534fa7e564f0aed01642ea73b644abf9a0cd26b004b0529842ebd4760ef6ea2d2844d175fdd6c19f06bd39dbca6b1

  • SSDEEP

    6144:zmcD66RRjL5JGmrpQsK3RD2u270jupCJsCxCI:KcD663KZ2zkPaCx9

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

chrometr.zapto.org:15963

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    system32

  • install_file

    Drunken Loader.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Approved at the moment is not Drunken Loader license

  • message_box_title

    HWID Unauthorised

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 42c1af434ab2d1f4b219cb5976c05b89_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections