General

  • Target

    e6f4de99462a736742b9caea4e574c215a3495b55b1a63e53bb91d5bf271f20e

  • Size

    289KB

  • MD5

    46f2b34d5a439c6a4a55a497394ac240

  • SHA1

    1eea75c5fd4e8e12929438a293d81a8a8328ca93

  • SHA256

    e6f4de99462a736742b9caea4e574c215a3495b55b1a63e53bb91d5bf271f20e

  • SHA512

    cdcd8f44ad493731177fbfee86509aac6e7a8768d5f036a5cbd0153bc7ea50655635991a74dd9bd78fde731366b1ba1c5cd57ab3008d5d4f54b6c5c171f4b038

  • SSDEEP

    6144:+OpslFlqNhdBCkWYxuukP1pjSKSNVkq/MVJbs:+wslITBd47GLRMTbs

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

Mutex

TQ8O01K050J1OG

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

Files

  • e6f4de99462a736742b9caea4e574c215a3495b55b1a63e53bb91d5bf271f20e
    .exe windows x86


    Headers

    Sections