General

  • Target

    c39aad805fe6224f326d92fc457420aa_JaffaCakes118

  • Size

    300KB

  • MD5

    c39aad805fe6224f326d92fc457420aa

  • SHA1

    ff6629762c6614be523cb4b0992f1a40c4ee59e3

  • SHA256

    954f71fd12eaaa2ba89c502931bcbf83e2b1c0cfd6dcc7b956fdb2854b863f86

  • SHA512

    2d1b4bf328db33b0571fb865114a2d230c8fc3032da1dec65b94e20ed5fb0f93d341411ca4095541121b3bca40873142308225fcbfa101e5b6e84d8a7a1b1e3d

  • SSDEEP

    6144:zi3VA/P7beS/ycZ6W8fEXPisNZXD+F4cdNzngN0BRoUgcReCY8Esjl:WA1h82isHiFX3z2mwCb5

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Arslan

C2

cyber-mafia.no-ip.org:81

Mutex

7O00X1P34NUKW8

Attributes
  • enable_keylogger

    false

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    DCS1000024

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please save this file to view content.

  • message_box_title

    Warning

  • password

    123123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • c39aad805fe6224f326d92fc457420aa_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections