General

  • Target

    ea22bdcf747163b356086e7ea302c35b_JaffaCakes118

  • Size

    289KB

  • MD5

    ea22bdcf747163b356086e7ea302c35b

  • SHA1

    ef21f4d8ec98245896b6ab447baa6cce5f861eb0

  • SHA256

    3c5237e3dff6b89eb83801cb10d40d147ad85aa0b7fbfd33be0b7968e3043921

  • SHA512

    a310d2c99b0e600e175f9bfea24729df36f1cf3d3cea1d61c136940c14ceaac1ad38c429d824c42ea3e0697cb8336608481b7a4417550218cca6810350a9f025

  • SSDEEP

    6144:COpslFlqOhdBCkWYxuukP1pjSKSNVkq/MVJbs:CwslrTBd47GLRMTbs

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

leetop.wowip.kr

C2

sexn.codns.com:6012

Mutex

5C8XB74QR4A1TG

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1533

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ea22bdcf747163b356086e7ea302c35b_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections