General

  • Target

    af9f65c0fd0037af5a1cf81e5c4a20aeee394d8f04e5f1fb8f6e83453c238b44

  • Size

    277KB

  • MD5

    603eb9f87378eb32f9370f464bd46610

  • SHA1

    b34747901cf352cd56f6ffbc9db1aa838dee7098

  • SHA256

    af9f65c0fd0037af5a1cf81e5c4a20aeee394d8f04e5f1fb8f6e83453c238b44

  • SHA512

    2cd400c4163fd2af1fde2a7e6b4c961bb9f4275a14a686e33d9fea623a6fe1f86ecebbb339acba403bc3f5fa8413d8a0b8d80f0a40f63ea2d94179123af1fab8

  • SSDEEP

    6144:HyuMwiLdfn2m7mrUsqWBn837FNldObO3k1jX:SuMwQ2m77sZB07FxObO32L

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

1236

C2

sajaaliraqe.ddns.net:1236

Mutex

3C5J40OJA0PL00

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    njRAT.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1236

Signatures

Files

  • af9f65c0fd0037af5a1cf81e5c4a20aeee394d8f04e5f1fb8f6e83453c238b44
    .exe windows x86


    Headers

    Sections