General

  • Target

    7a8dc0604f7b4625b3cfc59591df27968eaa59cc6e61f7877a879781c2b0b6e5

  • Size

    284KB

  • MD5

    96c2fb4da33af9246020f58a80558595

  • SHA1

    cdc2c1feb17f94f244333354a335c8ef04f10bc7

  • SHA256

    7a8dc0604f7b4625b3cfc59591df27968eaa59cc6e61f7877a879781c2b0b6e5

  • SHA512

    52f9cc4adc6a2fc456378db07c81fefe812b7d528fa7f1203cc1e9d4b1ce710b51cc5d11ea5b572712ba845f7a29be89b985722e4a5dea32db8a45160ba6e7f2

  • SSDEEP

    6144:rk4qmXun6VDTommKVt+OyBYa0DfioUkGTuKpoNDga5sX:Q9yqqTXmKVja1o4igh

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Gurban

C2

ygd.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 7a8dc0604f7b4625b3cfc59591df27968eaa59cc6e61f7877a879781c2b0b6e5
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections