General

  • Target

    5b1d3738873cbad7b54a257c10fab2b3effdd501872ab2b31282b91ea5777d2f

  • Size

    336KB

  • MD5

    802d77be29922796917419d5413978e0

  • SHA1

    7b209e833cdd078f2e1668363815fa456379a736

  • SHA256

    5b1d3738873cbad7b54a257c10fab2b3effdd501872ab2b31282b91ea5777d2f

  • SHA512

    f441e3974af3d3e7333ddeb1c91cbffae0a80c68e1b7b02728bc745e68f9b860646d38a0b876dd091eec210a8803225045c3161a8c5bfc7b82749ae64811c507

  • SSDEEP

    6144:Ti3Vu63n10GkWKJIZQcFweWlXtFEvY1Y+UVQqLBN00LDeu6texshn7:2u65DukwzBtqwjUBKsLfxsd7

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Hacked

C2

cybing.zapto.org:91

cybing.zapto.org:81

Mutex

YB33CI7W882461

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    Virus Crypter X.74.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    run-time error: '34552 Please contact your local Administrator for this acess

  • message_box_title

    ERROR

  • password

    123123

  • regkey_hkcu

    MICROSOFT

  • regkey_hklm

    MICROSOFT

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 5b1d3738873cbad7b54a257c10fab2b3effdd501872ab2b31282b91ea5777d2f
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections