General

  • Target

    f1da10e0f9d2389a6e963fb6b009a67d04488104bac0e9ff68d821e613a2b346

  • Size

    472KB

  • MD5

    7d0b683856272e2d03c3fc53afd0b911

  • SHA1

    56c50bc8871357c7514f948849ea37cb30a6e738

  • SHA256

    f1da10e0f9d2389a6e963fb6b009a67d04488104bac0e9ff68d821e613a2b346

  • SHA512

    7e05cd380e69ca2b805e7aa5074ba18f870d9ea69619cde039142ebc284d500c5170af25c11bab66a6ddc8cf48f5d8a4615ee7b76b1a9f22ca45fe2a9cfadd7e

  • SSDEEP

    12288:PpbTtq4oM5zLZj98SVFBUXnLRb9cBxlkuxmxgMnEM1+EQH:RddogzLdOSVFBUXx9SxOuxTCEM1/QH

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

hawet.zapto.org:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f1da10e0f9d2389a6e963fb6b009a67d04488104bac0e9ff68d821e613a2b346
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections