General

  • Target

    777da0d4e3a46f40c6e35a5363eb5d15fb0f41d286b619b9131716f1f260f3f5

  • Size

    276KB

  • MD5

    2109f0a3320c201cc1091df98b7efb86

  • SHA1

    6525f552c046d57725741ff69f1002a41fc8ccbe

  • SHA256

    777da0d4e3a46f40c6e35a5363eb5d15fb0f41d286b619b9131716f1f260f3f5

  • SHA512

    62a9b70aef475ec7410ccdd5f8eb04f9dd96075c413468b329cd9910d89991010b44236421221e032cc9a1d97b087e43b1efe6d5b5e7b2fcc50250083dbf46ac

  • SSDEEP

    6144:P4ABF94VpAuO/50BTnqPd0Mpz7qhh4nXjjf8MZ9BKXK0:AUDGLE0kuGnESB0

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

gerble1000

C2

77.99.42.95:81

Mutex

BKA1S0U0RUP727

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    iexplorer.exe

  • install_dir

    WindowsUpdate

  • install_file

    WindowsUpdate.dll

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    bart1000

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 777da0d4e3a46f40c6e35a5363eb5d15fb0f41d286b619b9131716f1f260f3f5
    .exe windows x86


    Headers

    Sections