General

  • Target

    562c724c7e229f260b4b9aeccd749372c70cd632e5212cf1eb1bec9d78684339

  • Size

    344KB

  • MD5

    6cf173a51c5b3a6afba7d2ce55f447e0

  • SHA1

    b68ec98ed2e593172f7a6f6cb63f074de7c54849

  • SHA256

    562c724c7e229f260b4b9aeccd749372c70cd632e5212cf1eb1bec9d78684339

  • SHA512

    17f57186109e47636f8fe6f01e0c96a922180febc2098069dd9483c941914dbf04f4742f7dbd32710e3f6e2a578be921fbf93a2b21c7731e966794789f634a43

  • SSDEEP

    6144:BmcD66RG5JGmrpQsK3RD2u270jupCJsCxCMI+rc:0cD66NZ2zkPaCx

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

aleezica.no-ip.org:1337

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    teste.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 562c724c7e229f260b4b9aeccd749372c70cd632e5212cf1eb1bec9d78684339
    .exe windows x86


    Headers

    Sections