General

  • Target

    c4b9a8d95c8dbe25f02e932133b5dac00e7e5ff18cbd0688a72aff6c5ec22f3a

  • Size

    428KB

  • MD5

    a32621b804955afd293d81136e2475d0

  • SHA1

    d387d88f1bab717efeee2a23e12861ed974911f1

  • SHA256

    c4b9a8d95c8dbe25f02e932133b5dac00e7e5ff18cbd0688a72aff6c5ec22f3a

  • SHA512

    88900e05db40f1ce026229c280633bcb5ac97954f7c15dfcddde7472bd2cfe46795e5f858e9587172ae0c7b039f283c79154b292abd1d722a860d433bbf5d46f

  • SSDEEP

    12288:BuMwqBi8vvrHxVPKyv2m77sZB07FxObO32U:BHwj8vrx52t07FQaL

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

ID

C2

Sprite089.no-ip.info:8080

Mutex

EBXI46558HVFPB

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • ftp_password

    password

  • ftp_port

    21

  • ftp_server

    ftp.server.com

  • ftp_username

    ftp_user

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • c4b9a8d95c8dbe25f02e932133b5dac00e7e5ff18cbd0688a72aff6c5ec22f3a
    .exe windows x86


    Headers

    Sections