General

  • Target

    c14392588e1a569b86c737f62adfeb514e66c113559d87bacc6d0d3cc81cce98

  • Size

    296KB

  • MD5

    0c54e3808c33a1acb9b4e073ff5dfb09

  • SHA1

    66f3bbaf83787af30158612a53b8f36eb5e6ea2c

  • SHA256

    c14392588e1a569b86c737f62adfeb514e66c113559d87bacc6d0d3cc81cce98

  • SHA512

    764769fb03048a17078dbc54181ee23e57b5adebc8f6bf2ad4b1c86900ad8385b4390115ae00886430d09d4c198abb7ba706fb2ac6fd6ced881fabd1e6410287

  • SSDEEP

    6144:POpslFlqahdBCkWYxuukP1pjSKSNVkq/MVJbf:PwslHTBd47GLRMTbf

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

kim2kim.zapto.org:1604

Mutex

767M40421W0X6V

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    javs.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    techno-techno

Signatures

Files

  • c14392588e1a569b86c737f62adfeb514e66c113559d87bacc6d0d3cc81cce98
    .exe windows x86


    Headers

    Sections