General

  • Target

    f331745bdebcbbafb269405e7012113b3f7ff77012f0cbe230482da90be94be7

  • Size

    428KB

  • MD5

    0decc55d15265860e51853f64e07f500

  • SHA1

    73972449d232eba2ea658c85692b3467b3107825

  • SHA256

    f331745bdebcbbafb269405e7012113b3f7ff77012f0cbe230482da90be94be7

  • SHA512

    7f67b011a5d49814e6415e247be5dfc74e4f2fcfaf89b9f16cce26b4708bcf07205b25868c3145153b3349b44ec3a3f1cea50d8ee74515bdee4740fa2bb612a6

  • SSDEEP

    12288:BuMw/Bi8vvrHxVPKyv2m77sZB07FxObO32K:BHwM8vrx52t07FQa9

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

Client

C2

ph4nt0mzz.zapto.org:999

Mutex

33TSY60A04B44Y

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    mstcfg

  • install_file

    mstcfg.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • f331745bdebcbbafb269405e7012113b3f7ff77012f0cbe230482da90be94be7
    .exe windows x86


    Headers

    Sections