General

  • Target

    a0aa67abc435cc18baee8a7daab3865c4f08da9be1c7fa7ec8cdd377d29bf3d9

  • Size

    421KB

  • MD5

    0e4d455a660bc8e6a2c390131297a353

  • SHA1

    d8900036d0a371ab6763fba8268b391b1996db62

  • SHA256

    a0aa67abc435cc18baee8a7daab3865c4f08da9be1c7fa7ec8cdd377d29bf3d9

  • SHA512

    dd4a03115f92ae747a555495d818575c8e8f2f6064482c9f836732fd7c83757d3f3c9c9996cb86cdc7bcde0ceaf735938f698f30d4641c8253724100189fb886

  • SSDEEP

    6144:6mcD66Rrc5JGmrpQsK3RD2u270jupCJsCxCO+1UYVIi2sPeR0dWNde5or:PcD667Z2zkPaCx9+yYd1PeR04NdeI

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

victim

C2

b4y23.no-ip.biz:84

Mutex

**mutex**

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    Svchost.exe

  • install_dir

    config

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    b4y23

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • a0aa67abc435cc18baee8a7daab3865c4f08da9be1c7fa7ec8cdd377d29bf3d9
    .exe windows x86


    Headers

    Sections