General

  • Target

    e76181ef63308944e83dd9fae0d66eee8f30055214e8ad7652d27954e3826c9c

  • Size

    586KB

  • MD5

    411aeba75ac564b3a745074c79cf0ab0

  • SHA1

    62bd57589794098989e43ef21791da0a0d78911a

  • SHA256

    e76181ef63308944e83dd9fae0d66eee8f30055214e8ad7652d27954e3826c9c

  • SHA512

    2f7868f9003af23c86b412ac9e725c2fcc49be31266865cad02cc429135c620155f41e0e20371198358dbe2bf6aeab2452d51d30ac2f8eccfd6db7182adcfbd1

  • SSDEEP

    6144:smcD66RAtjB5JGmrpQsK3RD2u270jupCJsCxChI+Ygc:dcD66utjcZ2zkPaCxbgc

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Êã ÇáÏÚÓ ÈäÌÇÇÇÇÇÇÍ

C2

ahatsha3r.no-ip.biz:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    ÇáÈÑäÇãÌ ÛíÑ ãÊæÇÝÞ ãÚ ÌåÇÒß åá ÊÑíÏ ÇáãÊÇÈÚå¿¿

  • message_box_title

    ÊäÈíå!!

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e76181ef63308944e83dd9fae0d66eee8f30055214e8ad7652d27954e3826c9c
    .exe windows x86


    Headers

    Sections