General

  • Target

    d139abd58a7f835a6f6af5fe5df51f2f755e95bf3d01531de6eb990afbcad0da

  • Size

    283KB

  • MD5

    4043ec22c007d5026b965d4ac31664b1

  • SHA1

    878ac536b05409d6393b7ca8d4022338a1ce369c

  • SHA256

    d139abd58a7f835a6f6af5fe5df51f2f755e95bf3d01531de6eb990afbcad0da

  • SHA512

    eb44492e14d819babc296bb4c681bcaa88cc53f705232da85ad4d531a1455e7699d72fad029b1396e6cb7a689a0d8cbe4b5f3006011badf457b8af1110a20055

  • SSDEEP

    6144:zmcD66RRj25JGmrpQsK3FD2u270jupCJsCxCG:KcD663P92zkPaCxz

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

yuribalz1.no-ip.biz:2000

yuribalz1.no-ip.org:2000

Mutex

asdasda

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    taskhost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    Sistem32

  • regkey_hklm

    Sistem

Signatures

Files

  • d139abd58a7f835a6f6af5fe5df51f2f755e95bf3d01531de6eb990afbcad0da
    .exe windows x86


    Headers

    Sections