General

  • Target

    9e94d27b03db7f6b094434012f2e11247dcd5d09249010e757a742d035c75121

  • Size

    276KB

  • MD5

    0c3f05c14580da378641566dfffd4b1f

  • SHA1

    43ff9445a504c9e629563f374a8aaac18bdd0f22

  • SHA256

    9e94d27b03db7f6b094434012f2e11247dcd5d09249010e757a742d035c75121

  • SHA512

    5d3766b575b50ebf78bd9f1340398d11b1363b00b61139f297d42dc4176135cfb8d2d28a03bf599a906f6640aa004493d3c15593978b54e7d61f323114f05a4e

  • SSDEEP

    6144:Rk4qmXIq1ifDDELtne8eSVSK0q7yMsApzxdrpjMqr:G9sYfDIbSVpAFxnMq

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

miguelitho

C2

miguelitho.no-ip.org:81

Mutex

miguelitho

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    svhost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Imagen DaƱada

  • message_box_title

    Error

  • password

    miguel08

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 9e94d27b03db7f6b094434012f2e11247dcd5d09249010e757a742d035c75121
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections