General

  • Target

    JaffaCakes118_78980376bfa8e35d6fb14a2159417181

  • Size

    347KB

  • MD5

    78980376bfa8e35d6fb14a2159417181

  • SHA1

    87c191a90135c55dfdf6d590f7f2845b989b5141

  • SHA256

    09464e0e9efc27cee2f09ee8086ba3cd432068390200d5dc744085c545cbad4c

  • SHA512

    20e9751b6afa396724338b118b86230291f757f8bf420805d858495d717c4fb58a4fb772933262749d6600f1c70d0903c9396c5853360fbc99da0e8758ad4980

  • SSDEEP

    6144:LOpslThdBCkWYxuukP1pjSKSNVkq/MVJbIIIo:LwslTTBd47GLRMTbX

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

10.0.0.236:82

Mutex

C324217L0X11RF

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_78980376bfa8e35d6fb14a2159417181
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.