General

  • Target

    943e1449e4b1ac96a200afc82af290294ece5671d983ef6d05a32c28d5075795

  • Size

    599KB

  • MD5

    a30446ea5a775b3fc2859b2f88d8ab72

  • SHA1

    56c512f192f93e7e1f9af05822c5cb9c4ca1022e

  • SHA256

    943e1449e4b1ac96a200afc82af290294ece5671d983ef6d05a32c28d5075795

  • SHA512

    eef5646638984abf3f4f960bb3fd19e3c118d44af1b57dc4bd89bdc95fdf6f5beafa86e2f35266dc7556706c8224bfc12b1e8efdda806846bb57f2aafd2ef6d0

  • SSDEEP

    12288:VcD6630jg+OisWuL0hOAZvDVXhZ2zkPaCxa:VNg3isWsWvDdhZOklQ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

saly.no-ip.biz:288

Mutex

KEPRDS

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 943e1449e4b1ac96a200afc82af290294ece5671d983ef6d05a32c28d5075795
    .exe windows x86


    Headers

    Sections