General

  • Target

    61b2310d3732c0006dc7f3fec2277d0d38288b2a43a21daf6ceeab3350ec3f90

  • Size

    283KB

  • MD5

    a33c8fa06bcc84393d0d7bcefddc4d70

  • SHA1

    5cc049836882f9309a610a6638ae12184cfc65f8

  • SHA256

    61b2310d3732c0006dc7f3fec2277d0d38288b2a43a21daf6ceeab3350ec3f90

  • SHA512

    7a1e210cdbfa268e891a6e22c83d98b9149e915b6cc085690619c9a0674a52a4df8f02606307b5b765370b07098a5c904b26b062f1d14fce71c521f6d685251d

  • SSDEEP

    6144:b4ABF94m3pAuO/50BTnyZsSaXhh4XAS79hO9R0O91FG+W:UU6GLyWSKaAS79MEqfGt

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

remote

C2

ninja007.zapto.org:999

wandra.zapto.org:999

Mutex

E013VA8Y3H2QGX

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    system007.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    system is working fine and faster..!!!

  • message_box_title

    Configured

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 61b2310d3732c0006dc7f3fec2277d0d38288b2a43a21daf6ceeab3350ec3f90
    .exe windows x86


    Headers

    Sections