General

  • Target

    e83c7fbc3ea1d4435dea3007e85066150a9e78e345f111034c29b1a4c2e48bfe

  • Size

    314KB

  • MD5

    543214fe2e1d62333589fcf0b8fcf1b1

  • SHA1

    230da099bb3e21d2ff411913127141dee6275d5c

  • SHA256

    e83c7fbc3ea1d4435dea3007e85066150a9e78e345f111034c29b1a4c2e48bfe

  • SHA512

    f64647e5babea3c220e7d5f55a7304b589868540a2369a22d153cd341cd66a2df7a8a536191da539351e0aa07e1cff339522f38e1f692d27299621e9f71772f9

  • SSDEEP

    6144:dmcD66RRjJ5JGmrpQsK3FD2u270jupCJsCxCI:IcD663U92zkPaCxH

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

paulo4i20.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    PB

  • install_file

    system.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    1234

  • regkey_hkcu

    system32

  • regkey_hklm

    system

Signatures

Files

  • e83c7fbc3ea1d4435dea3007e85066150a9e78e345f111034c29b1a4c2e48bfe
    .exe windows x86


    Headers

    Sections