General

  • Target

    fceee1add38aa137505068b4055b82692558f39c89eaaff99fcace8a96a6aff8

  • Size

    276KB

  • MD5

    5e0daadd680b75e2908c77b653eefdbc

  • SHA1

    745b6b1ea2e1e322a781d57556a4528090d7e458

  • SHA256

    fceee1add38aa137505068b4055b82692558f39c89eaaff99fcace8a96a6aff8

  • SHA512

    8f327cc8f20658dc134482d67ed66c319f153805abf177ddee00e193c8e122687b2e7f672753536d9e3cbfb2ccbe1c9a54a93f44673189c44db9f0e304c43128

  • SSDEEP

    6144:hk4qm1KhJxOSRySBKaMnsiCfb/vg/6RmEh23yKYcM66:29LJIaywKCfBPhDKY

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

edmundo.no-ip.biz:190

Mutex

spynet

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • fceee1add38aa137505068b4055b82692558f39c89eaaff99fcace8a96a6aff8
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections