General

  • Target

    1de92ad22d578c37b6459fbd1082270bbc4452dd05b60e81129d1e93998469dc

  • Size

    283KB

  • MD5

    21168b50a4daa1485311763f96a2b551

  • SHA1

    8d86b2d0a234a923680aa72aee708bde7a8ba651

  • SHA256

    1de92ad22d578c37b6459fbd1082270bbc4452dd05b60e81129d1e93998469dc

  • SHA512

    254d1dc90078fa80e74bebaa1486b425f8b0b07d6beb3e2c85f74dade2f113ed381f61f126f6f5446aff943b6e92e8658c608144f2ae7811b3e379c68469e690

  • SSDEEP

    6144:Sk4qmh4wbzYb7ndk2vRJI/s62f+PGlA+e3x5Z3:t9mit4U6u+eGxD

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

nemlacom.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    msn.exe

  • install_dir

    msn

  • install_file

    msn.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please try again later.

  • message_box_title

    Error

  • password

    nouri

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1de92ad22d578c37b6459fbd1082270bbc4452dd05b60e81129d1e93998469dc
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections