General

  • Target

    2dc024fcd15846261c4721a9ed4c9b451b84a80abe2c5dc26eef7d5ea62ca9f3

  • Size

    284KB

  • MD5

    7c7eb1d06dad80c7818f821e39f1691f

  • SHA1

    cee38ec3ac9455ce54ae74080013aba40e2a28f8

  • SHA256

    2dc024fcd15846261c4721a9ed4c9b451b84a80abe2c5dc26eef7d5ea62ca9f3

  • SHA512

    e891ec8e84e0475583675f709a2e159cec041b05836dbe33b29103fab967e5c530cc299ecfd8a17b5615773834326b84c13d1021eb6a7d0abca54faf4d9ed475

  • SSDEEP

    6144:Ek4qm8Kf1pP7pMaf/T6sSnABQY5+gFvR13XjHA9TrGoC:H9AzpMS2gB5pFvPjQSF

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

spy-net5.no-ip.biz:777

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    asa

  • install_file

    Win_Xp.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please try again later.

  • message_box_title

    Error

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2dc024fcd15846261c4721a9ed4c9b451b84a80abe2c5dc26eef7d5ea62ca9f3
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections