General

  • Target

    a6513d4edf997beff4fa0b91e3789a611bc32aeb3fc8fb2e29cc387a34f2a8ff

  • Size

    296KB

  • MD5

    04f47ff66b5faa3626b977d7742cf9e6

  • SHA1

    6a8e40c9f5d9db6fb02e7eaa9a8da179a7b6fc34

  • SHA256

    a6513d4edf997beff4fa0b91e3789a611bc32aeb3fc8fb2e29cc387a34f2a8ff

  • SHA512

    8200fd55af112fb605cd3c910a0052b2ac7ef67ba1e4e22da48ddc7d8abaccebe2542a766cc41300989137d5d37813397f46fca3d88139bac79f64e31fd1aeda

  • SSDEEP

    6144:Dk4qmXIw4G+MI3kcgPkTwmkGYXv03JSew3j45AZbu3/+MJ:49fyQ3kcgs8/v0i3j45h3h

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

127.0.0.1:81

innadog.zapto.org:1022

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a6513d4edf997beff4fa0b91e3789a611bc32aeb3fc8fb2e29cc387a34f2a8ff
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections