General

  • Target

    JaffaCakes118_7698c6a326c1f37db5346bf1bd156200

  • Size

    357KB

  • MD5

    7698c6a326c1f37db5346bf1bd156200

  • SHA1

    ca12175a923dc2348a8a9f9a25c9c6ec748b9ba8

  • SHA256

    91472e4d1b1f24a2fd24a06c895aa9db2a7ebf749ccd5c323a3ebb23998d9092

  • SHA512

    d3328c4f5b158b76e6b4a58117893e091b0131a3599b98a78eb18a7d0dcae8893a8340174a1442fb044d986560b65dbe3728b55c0b0dca3eb14f2de98439a91b

  • SSDEEP

    6144:WOpslFlqShdBCkWYxuukP1pjSKSNVkq/MVJbUNSDyDIkFthp:WwslJTBd47GLRMTboSDyTFtj

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

you

C2

logicfreak.servegame.com:6000

Mutex

G15DP25DTK6EX0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_7698c6a326c1f37db5346bf1bd156200
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections