General

  • Target

    56e13a3ee0951a9c801d82b2eaad77acdaf9fa87c9f343baed3a429603605a53

  • Size

    280KB

  • MD5

    98964b79a56d9c22dba81b170ea6858f

  • SHA1

    64e8a466aed68b3d511c6e74745918599bf70fa6

  • SHA256

    56e13a3ee0951a9c801d82b2eaad77acdaf9fa87c9f343baed3a429603605a53

  • SHA512

    0a1176728cd618eeed822d00a815bce309bd31e53d3645625488954fcf97fdf7669b5087b06ffeca167c20b212bf41e0840ce5a2dd2775b5a0a0b56dd026ae83

  • SSDEEP

    6144:B3LZ2sxZZQttyCVxaWYSdMU/77hlruc6XmDoTbcI7CPPdq:58eAtpVxagMU/plruchDofAP0

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

remote

C2

pppero26.no-ip.org:81

Mutex

883KF841D1CP64

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    test.exe

  • install_file

    test..exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 56e13a3ee0951a9c801d82b2eaad77acdaf9fa87c9f343baed3a429603605a53
    .exe windows x86


    Headers

    Sections