General

  • Target

    e97a1046ea397536fbfcc02a25166e22462ea05c45ed2cfa1b1db0b17f656bae

  • Size

    272KB

  • MD5

    6872bf977d8e719ff4bb9808db573795

  • SHA1

    87aaf056c62d2999ebb3d9ae401976688c0c4364

  • SHA256

    e97a1046ea397536fbfcc02a25166e22462ea05c45ed2cfa1b1db0b17f656bae

  • SHA512

    e131578e5ec6147e7b213125c967eeaf1b6c00a24b0ea66f7113ba7e77646ea045c288f5d71760858e0bfcf958ba2e56b0119d28b70243ab7622a6e72c9e0eba

  • SSDEEP

    3072:AFYMy3kanFE/pudIryVR2zQJt0Vv8BPyLtgmFgbCe/tMd5FxsFsgYfF4KnXctqxH:pM0DE44ymUJt0VU1mFD5FmYfuWnNbp

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

faresm.no-ip.info:5250

Mutex

H15V7415J6GEUM

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e97a1046ea397536fbfcc02a25166e22462ea05c45ed2cfa1b1db0b17f656bae
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections