General

  • Target

    ae169d2cafc3f513ca355f4570b56800b267f780de339eb0d8aa47da746abbcf

  • Size

    296KB

  • MD5

    801c05a5d61883df78d04f2fb5612d5d

  • SHA1

    7a688e5850c935e32e5176756cb6af84eea697c9

  • SHA256

    ae169d2cafc3f513ca355f4570b56800b267f780de339eb0d8aa47da746abbcf

  • SHA512

    b004e7be4a7d41eca52a5832c0054e60dd361a6b61483cb19896bfc6721e41b09a0f84c4f1054da445e6310ea3e2a050f0c2d677dc1c1497e859d64d165a1a60

  • SSDEEP

    6144:/OpslFlqUhdBCkWYxuukP1pjSKSNVkq/MVJbJ:/wslVTBd47GLRMTbJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

Mutex

838X82BE0Q7S0M

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

Files

  • ae169d2cafc3f513ca355f4570b56800b267f780de339eb0d8aa47da746abbcf
    .exe windows x86


    Headers

    Sections