General

  • Target

    6d2cef638430da535bf1fe7ace212b9f7230eeb5d795d1dc0878762a053282c4

  • Size

    689KB

  • MD5

    7a8ee23b2405a6a6cc7810ccd56890b8

  • SHA1

    e83c8a5ecc04091d443ae22666b6b4d10bd7f179

  • SHA256

    6d2cef638430da535bf1fe7ace212b9f7230eeb5d795d1dc0878762a053282c4

  • SHA512

    049b43b69e813849627c6a742928d51b769e2b47b71c9aa02a3065ea7c2702cb89f89e31f4f029868d124ce3b5361a3ced2cdc3596aa2512a52dae9111ac9057

  • SSDEEP

    12288:jcD66kQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQR:jvLtwCc26uGi2VCHXSBzTaDMsAQR

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

127.0.0.1:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 6d2cef638430da535bf1fe7ace212b9f7230eeb5d795d1dc0878762a053282c4
    .exe windows x86


    Headers

    Sections