General

  • Target

    afccbad4af73c0d162c5d5a9d8371416b77deced14cde1362607c1a2c9dd5fcc

  • Size

    308KB

  • MD5

    6246da64cdb6bf43e6f45f0d18c89439

  • SHA1

    9ff181f7c14d11e9a4ad0619b37d2bcfaa278330

  • SHA256

    afccbad4af73c0d162c5d5a9d8371416b77deced14cde1362607c1a2c9dd5fcc

  • SHA512

    a1d54f8553657c0043ea02f599f0da36ad76bc43fbea3884b98d5bcdb288daf7f1e6db7fcf3bfa9d00fee54834e1f21655ffa706bc9f5259c66b2c737cff5c69

  • SSDEEP

    6144:Fk4qmamRhW8ZSEIan5MoALx8fD7yrEoLikbcsy5HTRe3QieC/F2bKYzn:C9hmvS/8fPyrVikbgH43QieC/F2bKYzn

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

vooov.no-ip.biz:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • afccbad4af73c0d162c5d5a9d8371416b77deced14cde1362607c1a2c9dd5fcc
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections