General

  • Target

    JaffaCakes118_4fdda8b7c7df95df1092c5e74a55ccb5

  • Size

    428KB

  • MD5

    4fdda8b7c7df95df1092c5e74a55ccb5

  • SHA1

    6faf2b3b9949f72b2f3827f288d123ae573a810f

  • SHA256

    f8f97d73549696e5deea14a3d4c3c3a76223661c364edca4bcd25adb97b4a70c

  • SHA512

    3a1ec7843a8ae03c592dfd495a1f2e64841ab43dd438da61656d0d262144a0b30644bd68f2093e6d204fc4d6a69777f7d7d1629a0af8f30979612af8e7be452e

  • SSDEEP

    12288:xuMwSBi8vvrHxVPKyv2m77sZB07FxObO32h:xHwr8vrx52t07FQao

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

cutgur.zapto.org:1234

Mutex

6FVB675IR75116

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_4fdda8b7c7df95df1092c5e74a55ccb5
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections