General

  • Target

    JaffaCakes118_02fe028b9fee4f668c9e29f624012343

  • Size

    428KB

  • MD5

    02fe028b9fee4f668c9e29f624012343

  • SHA1

    eddf7f52032b44e097886ffaa77ceb1651b28e30

  • SHA256

    943483fecf179584496851334a016834d5657969107a32717cbdfb111d8ec36e

  • SHA512

    2d521c59958a92dbb18d155ceffadee146201185dd1557c7cdb10a31936e2cbec262b09a047df6cbb57597d143c7ed8b29abc00c7d0642d3a1c6b02734dd4417

  • SSDEEP

    12288:xuMwmBi8vvrHxVPKyv2m77sZB07FxObO32v:xHwP8vrx52t07FQam

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

hellofool.no-ip.org:1645

Mutex

VVRN882K3KL02U

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    adobee

  • install_file

    reader.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    olleper

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_02fe028b9fee4f668c9e29f624012343
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections