General

  • Target

    ea48161e1d248d39e865425db02c5419e0ac020b1eb70a24bde6357380dbf633

  • Size

    275KB

  • MD5

    0cc3f5ddb5602fbe8e38a191481e6b11

  • SHA1

    5c4beaaef70c2eebe6fbce0151d94c38da9544b9

  • SHA256

    ea48161e1d248d39e865425db02c5419e0ac020b1eb70a24bde6357380dbf633

  • SHA512

    c1aaa58e5b7566f6e6c62fc5c2447e87a37c8b9e808edb58f29c0997f88a6418d4e8ae666163e595cd8a4b0fa0117c5248fce7384665c1bebcf080e90b69984f

  • SSDEEP

    6144:Pk4qmiN8GAt1eHMMunOHK5ixm+eQ2X7FiS7O6h23LmLes9:894P1eHMWHKwbeQYtHhCm

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

darqblue.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    smss.exe

  • install_dir

    smss

  • install_file

    smss.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • ea48161e1d248d39e865425db02c5419e0ac020b1eb70a24bde6357380dbf633
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections