General

  • Target

    de66ea6bce351461f8c012a4c633548e_JaffaCakes118

  • Size

    289KB

  • MD5

    de66ea6bce351461f8c012a4c633548e

  • SHA1

    69860c674e3540334ba2de067473e296715961c7

  • SHA256

    dde6043bba3b2468732aeca98fc459e1a53c07a7ae0845edb7746575406ea704

  • SHA512

    5f7e796873219a17b278f7d4760c1abc9f9697a5d562b4549896607628470f63ee0639ab613bf6b22d94306d2be4058324f99edbc24964cc4ec7ec3ac54e767f

  • SSDEEP

    6144:mOpslFlq+hdBCkWYxuukP1pjSKSNVkq/MVJbd:mwslBTBd47GLRMTbd

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

pegnose.no-ip.biz:81

Mutex

3P6TEM5C5J5RO7

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • de66ea6bce351461f8c012a4c633548e_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections