General

  • Target

    JaffaCakes118_82d690c38dab37c257d67d5700c16c8d

  • Size

    212KB

  • MD5

    82d690c38dab37c257d67d5700c16c8d

  • SHA1

    b02b6d8349d36d32af48747dcf9ce8facf8cdf08

  • SHA256

    3e35d55178e3bb404d6981774d4a92ea8079505a6972c661cd918020450e6240

  • SHA512

    f346b25284e546e773daaf4b15949b357e26a42db14c8620b7e6d1a9836fa8bd51da239f3020ea8dc7af6249cd2e9cd1d78952b54c88fd49f5b4bee0f1b04b8b

  • SSDEEP

    6144:rr2BmkVkkehiXeUSmYfzTiTMjUO73BbRF:rr2Bgk5XVSm4T/Z7v

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.2.2

Botnet

asad

C2

192.168.1.3:85

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    config

  • install_file

    explore.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    ?? ??????? ?????? ?????? ???????

  • message_box_title

    ??? ?????

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_82d690c38dab37c257d67d5700c16c8d
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.