General

  • Target

    7a1c4a7fde21a8b1c9f22e1ab347502b1f20b76f6547494d1ab61449e9078df1

  • Size

    572KB

  • MD5

    54c786c614fbd832f5610254d0405aa0

  • SHA1

    bf1df425c5b54f07a3452afc33f13c906c176e2c

  • SHA256

    7a1c4a7fde21a8b1c9f22e1ab347502b1f20b76f6547494d1ab61449e9078df1

  • SHA512

    a27c88127ce923a4175662f98099160d970d00c0da1a9f37a85b90d1a6dcf8f50381d33b833cdcbcf307cc17ec9d1c43a95b1ff9483b325b27cab258009f64ba

  • SSDEEP

    12288:JpPYD7gRUnLmHKc6XRdzDMJM6Dr+RqDSvEx1wg:PPe8++MzDMJvX+EDTx

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

127.0.0.1:288

C2

127.0.0.1:288

127.0.0.1:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 7a1c4a7fde21a8b1c9f22e1ab347502b1f20b76f6547494d1ab61449e9078df1
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections