General

  • Target

    e7b697eef7f462548b2d03bb5f5f24a9_JaffaCakes118

  • Size

    303KB

  • MD5

    e7b697eef7f462548b2d03bb5f5f24a9

  • SHA1

    ac6a6a4cef8a00f79fa76604191b7129df44917b

  • SHA256

    195e29788b3bed46e893f63ea7b79970cb6e2931d6a2446f31d93164d406be04

  • SHA512

    0235445d86481a8edd5551178ee012df4bceb28a6c4ac70de245a6522b96439816b8a48630f28daa7a4b0ba3a8b6ba7e61a4132985c58562a5863da1754a37e6

  • SSDEEP

    6144:zOpslFlq4hdBCkWYxuukP1pjSKSNVkq/MVJby:zwslfTBd47GLRMTby

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remoto

C2

virtualboxjon.zapto.org:5876

Mutex

5O2QUPEU0VEC0I

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Drivers

  • install_file

    driver32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e7b697eef7f462548b2d03bb5f5f24a9_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections