General

  • Target

    d485a6266ed3739ef73614e13c183aa2e05e1fbb8bc70a97d939ce899073667e

  • Size

    296KB

  • MD5

    b89bef1d725df750d3b52e5df5c93542

  • SHA1

    82b555d9f4fa7ea64247d47ee4077414b6364e13

  • SHA256

    d485a6266ed3739ef73614e13c183aa2e05e1fbb8bc70a97d939ce899073667e

  • SHA512

    f923e9b64f050abe6c2921a145fbec335a0930b61217291ff8d0b5e648a9348f052882eec553a1126c4a9089614fc2aa253f04ba4e2591d773f9b7309d81a6ce

  • SSDEEP

    6144:/OpslFlqXhdBCkWYxuukP1pjSKSNVkq/MVJb9:/wslMTBd47GLRMTb9

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

volagon.no-ip.biz:100

Mutex

UN17CMT55P04CT

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • d485a6266ed3739ef73614e13c183aa2e05e1fbb8bc70a97d939ce899073667e
    .exe windows x86


    Headers

    Sections