General

  • Target

    bc0ccc8a11d77dde6bb0d0f373250741c0aaaf6614e2ca4b9cdf2c77f91caa79

  • Size

    296KB

  • MD5

    6cbe6df3df3c75dae644cf4a1f65ab0e

  • SHA1

    9319f442ad3add4292a289a72a24ab53f6e82bce

  • SHA256

    bc0ccc8a11d77dde6bb0d0f373250741c0aaaf6614e2ca4b9cdf2c77f91caa79

  • SHA512

    a6b2dc3830380a940aa2149967fd145b04bc306cbd42c0d607fdd197cd4facc9a8eb83170951027289712c76261e6fbd820504f39ec18e9aef6e12b88c6eab24

  • SSDEEP

    6144:/OpslFlqjhdBCkWYxuukP1pjSKSNVkq/MVJb+:/wslMTBd47GLRMTb+

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

hack

C2

jimmytest123.no-ip.org:81

Mutex

DAIL32K3DP8N2O

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Windir

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Patience

  • message_box_title

    Merci

  • password

    12345

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • bc0ccc8a11d77dde6bb0d0f373250741c0aaaf6614e2ca4b9cdf2c77f91caa79
    .exe windows x86


    Headers

    Sections