General

  • Target

    dea4dea28a6c02301b747cfa4bc63393b2148c6e1a52e2ff564324ce792d77c3

  • Size

    296KB

  • MD5

    7066a3c0155bd6254a6dcac3a9487480

  • SHA1

    fa4f9c8c09a2c55cc54ed2dd758c074e37ca9aa3

  • SHA256

    dea4dea28a6c02301b747cfa4bc63393b2148c6e1a52e2ff564324ce792d77c3

  • SHA512

    0c70dd38b8b58d4965ab6ad100b0946a146fe7537f1a70a98b4286b6489299eb761cd0a06e80e0f87bd63edf314584a56ab981760e0a059779317d045249d5f1

  • SSDEEP

    6144:/OpslFlqAhdBCkWYxuukP1pjSKSNVkq/MVJbJ:/wsl1TBd47GLRMTbJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

Mutex

8RX5518G36OU3K

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

Files

  • dea4dea28a6c02301b747cfa4bc63393b2148c6e1a52e2ff564324ce792d77c3
    .exe windows x86


    Headers

    Sections