General

  • Target

    8a6b8cbf87fb2d57892afcdc12a0fef7d2a1556c2a14221e84deac72171a7784

  • Size

    284KB

  • MD5

    6e29dbff6a75b76f0c40ce954779262f

  • SHA1

    64a5121fe1512b4e8ebeda0cce0bbc89db408525

  • SHA256

    8a6b8cbf87fb2d57892afcdc12a0fef7d2a1556c2a14221e84deac72171a7784

  • SHA512

    16dcdb12a40b3c6b52055d0a23af46bb7b79f2307ed0d579d6c42fac9140d6916fc3faa0469c375630106d9768dfd7307487fa8a2ff902d71b2a9762e0403f4d

  • SSDEEP

    6144:nk4qmC8iwsrI2L3gzBGe9Ve+GkHBbb/1iC4Xcil:k95FIg3gz1XhHfri

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

rr6600.no-ip.biz:81

rr6600.no-ip.biz:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 8a6b8cbf87fb2d57892afcdc12a0fef7d2a1556c2a14221e84deac72171a7784
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections