General

  • Target

    00e4fa2585941d6aad3fec87bb8d7e127cd8b78a1f30aa2729b05be77dc16f4b

  • Size

    680KB

  • MD5

    5aab2a8fceb38fbe8de78e1768695110

  • SHA1

    6ee8f0839c7ccc87bd82beba5bf0ef4889565b60

  • SHA256

    00e4fa2585941d6aad3fec87bb8d7e127cd8b78a1f30aa2729b05be77dc16f4b

  • SHA512

    dc5e4802fca428415dd14e8e21f911328c626b532e45efe5ea9893f46086efc51428ed547312c148bbff515babbd5ac6d7c9120f5590787ab24073bab647f949

  • SSDEEP

    12288:Zpq5aA0btcYtB0ArOEW/hMlEpH4npf2T:/20btcG0qOr/GlYIpf2T

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

192.168.1.131:81

192.168.1.131:2000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    false

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    System32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    El Programa no responde, ¿desea reintentar la conexión?

  • message_box_title

    ERROR x0.000001

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 00e4fa2585941d6aad3fec87bb8d7e127cd8b78a1f30aa2729b05be77dc16f4b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections