General

  • Target

    c32574d9b1a40c8053f19ec75258fa4e_JaffaCakes118

  • Size

    281KB

  • MD5

    c32574d9b1a40c8053f19ec75258fa4e

  • SHA1

    73d39a3c6c962ae2ebca4b2c92f59e56b3e5ae12

  • SHA256

    d586628d7214dd6db0804092f9a31b56fe701fce37af8dcd1bab9809dcac5209

  • SHA512

    3053e2437f7488974308e2470a4e61bf327c810fb9f2d3b27fa604af178069fd27b72cb48e406d4074b381b9d2844a9900c1a557c6b99991f90d22743d7f5d1d

  • SSDEEP

    6144:gScrLt4mp8D6WGc/YSlIipBieubLzeh7Yy0DMIdeXijX:xcKy78QSVUNyhsFMCeSjX

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

merabti01.no-ip.info:288

Mutex

2TH4461J3K8JE7

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c32574d9b1a40c8053f19ec75258fa4e_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections