General

  • Target

    JaffaCakes118_52e3970351134ac63c596b7a91018e71

  • Size

    275KB

  • MD5

    52e3970351134ac63c596b7a91018e71

  • SHA1

    897ed8607464782c1618ad43c04a8d5bca11aefa

  • SHA256

    c7c10523ceeb8f2cb1a4e626559a7524d03d5bde9f47a22bfbedc15c31878ef7

  • SHA512

    272955435432a90af72fc29efc6c36a91a07b420f7dce06448cdcaae77adac49966e616ce95cd7199e16650368d69a04a81028c2463750df0e61aa6b087df895

  • SSDEEP

    6144:zMI6DvUer2kDIU+EScfyoBvJebIfi7XKYJ:zbCvUerMUVbFBvJeMfi76Y

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

deso-bang.serveblog.net:1337

Mutex

15C0JJ8O06C6BM

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    Java Runtime.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    113372LEET3

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_52e3970351134ac63c596b7a91018e71
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections