General

  • Target

    190f7ad6e89d5c733458db8c6ffff6521ceea372b0ed38d0aa84cc92cfc04a42

  • Size

    429KB

  • MD5

    08eb95242b67542dd1c7c8b2464064df

  • SHA1

    e687332fbfe851bb41bcad34de85ff63f5a13155

  • SHA256

    190f7ad6e89d5c733458db8c6ffff6521ceea372b0ed38d0aa84cc92cfc04a42

  • SHA512

    7e5190acba830b12ca69fc4018c8c683eda1cb4ccbcb54b401a2426a67682c837eaaefc149552c13437d2b9af40c10b254e4be09f571a309b51b03ba8d34b428

  • SSDEEP

    6144:/4ABF94zQpAuO/50BTnyZeSaXhh4TAS79hO9R0O91F6+aFPwjU:wUUGLygSKqAS79MEqf6NL

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

remote

C2

127.0.0.1:81

Mutex

05LXH50RK4GXJL

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

Files

  • 190f7ad6e89d5c733458db8c6ffff6521ceea372b0ed38d0aa84cc92cfc04a42
    .exe windows x86


    Headers

    Sections