General

  • Target

    f020fccb504ddd6614d051ccf97ac34f3f8831216ec2dd7a77ff2a5176231be6

  • Size

    275KB

  • MD5

    8cfdbc18ae3053a2f0a9690d10199be1

  • SHA1

    eb554148236b09e60b6b6ce16847dcf3afd55a6f

  • SHA256

    f020fccb504ddd6614d051ccf97ac34f3f8831216ec2dd7a77ff2a5176231be6

  • SHA512

    acae7a4a270ca0312a7b444ad78baa0c21c328a5a50d7f9fa9a123fc72e7de73645323e4698f9f60921463ca2446a10bf4d745ba5e2fa96e8e4e387a69440fff

  • SSDEEP

    6144:vxJsGLnXoxDNT/xQphU+jrlgzfuzt91C9NDyWId98HhqbxtHGZ4:5JsGr4h/xQp6+tqOYy9zo0r

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.01.8

Botnet

Cyber

C2

127.0.0.1:999

myexample.no-ip.biz:82

Mutex

25058KEVKFG5A2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Winbooterr

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • f020fccb504ddd6614d051ccf97ac34f3f8831216ec2dd7a77ff2a5176231be6
    .exe windows x86


    Headers

    Sections