General

  • Target

    b68d66010c22bfc4da3f6241857981e0f4bf5de50e7c0649400f3e3811b5febc

  • Size

    277KB

  • MD5

    6f502fb960ffd89b9c5356a3becb02ef

  • SHA1

    abc25aa7f8fd3d68d770f5677fdff69c451885dd

  • SHA256

    b68d66010c22bfc4da3f6241857981e0f4bf5de50e7c0649400f3e3811b5febc

  • SHA512

    189b36b8f9051cec4c1a15afc83d3a66affe3f2c94746efa082c7e64a9202e0ea724d5dfe8e10a2640ee14887758871730ff4867fd4f0d629a8c24d6b76f6b51

  • SSDEEP

    6144:XyuMwiLdfR2m7mrUsqWBn837FNldObO3k1jQ:iuMwE2m77sZB07FxObO320

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:999

Mutex

KFQKJ28X520754

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

Files

  • b68d66010c22bfc4da3f6241857981e0f4bf5de50e7c0649400f3e3811b5febc
    .exe windows x86


    Headers

    Sections