General

  • Target

    04edf5105be2dfca9bd3e3dd9eaa6edc135ad8ca6b9253398621f1d833e4d45e

  • Size

    347KB

  • MD5

    4484894d41e95d29a8632289b0599f4b

  • SHA1

    273ed6b43177bf02aa4cb17c8232b518b232cfe3

  • SHA256

    04edf5105be2dfca9bd3e3dd9eaa6edc135ad8ca6b9253398621f1d833e4d45e

  • SHA512

    68df2c465701bea1926746db2417c371d64352c4a12937ffa0b5c779ca581afddddf0c8b5133e7091be0e5ffb522064218245103ef2b680d86971bffc198e490

  • SSDEEP

    6144:8OpslohdBCkWYxuukP1pjSKSNVkq/MVJbrIP:8wsloTBd47GLRMTbO

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

gay

C2

127.0.0.1:999

28r.no-ip.info:3085

Mutex

2F1O18PVG4A336

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    Keyname.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please Wait.......

  • message_box_title

    Loading.....

  • password

    123

  • regkey_hkcu

    sc12Keyname

  • regkey_hklm

    System Update

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 04edf5105be2dfca9bd3e3dd9eaa6edc135ad8ca6b9253398621f1d833e4d45e
    .exe windows x86


    Headers

    Sections