General

  • Target

    dfdc0882ccf581b98765c6862d8f4d141c81e96a2f46b30a4dc4a4e3dd0c5c77

  • Size

    296KB

  • MD5

    7b04ac3fa5aa93cebda66638163b690c

  • SHA1

    dd9d78a7e1432cdcab3441a4c7bff6aca6092f55

  • SHA256

    dfdc0882ccf581b98765c6862d8f4d141c81e96a2f46b30a4dc4a4e3dd0c5c77

  • SHA512

    88db4352c06c6141938a9fb635ad19858514220f8b6762deaf731c37fa933fd61ac30c2a4fee9d938d3a4fa0ca03bc6882b8b1c73b17fcd2f000104d7b647e13

  • SSDEEP

    6144:/OpslFlq3hdBCkWYxuukP1pjSKSNVkq/MVJbZ:/wsl4TBd47GLRMTbZ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

doc66.no-ip.biz:73

Mutex

BPKQUJ8R0NUYAB

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Googlechrome

  • install_file

    google.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    batman

  • regkey_hkcu

    update

  • regkey_hklm

    Googlechrome

Signatures

Files

  • dfdc0882ccf581b98765c6862d8f4d141c81e96a2f46b30a4dc4a4e3dd0c5c77
    .exe windows x86


    Headers

    Sections