General

  • Target

    36ed5cbd69ddf67c40efef5c4334252b5a1a881ed2b31e862c2cd18be642892a

  • Size

    324KB

  • MD5

    5cfa9fc3ebc99f5690271976b07058b0

  • SHA1

    7da754010c581b135f209ce0d120e985ee6fff4c

  • SHA256

    36ed5cbd69ddf67c40efef5c4334252b5a1a881ed2b31e862c2cd18be642892a

  • SHA512

    f7146d94f81fb4c5f506ec3436541b730eb71ff27644088d54f3166685b4e5ff1a2f3785859c5805a955fcf8b60bdb9d73112bb8514e0d87965273a19f5e909b

  • SSDEEP

    6144:COpslMlq3hdBCkWYxuukP1pjSKSNVkq/MVJb:CwslZTBd47GLRMTb

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

85.196.221.95:100

Mutex

ED0G2264O525O2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    WinFile.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    321321

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 36ed5cbd69ddf67c40efef5c4334252b5a1a881ed2b31e862c2cd18be642892a
    .exe windows x86


    Headers

    Sections