General

  • Target

    48fe8e366ffbf8c627e58340fab57c43eadb00ad75f30aeedbe656b7aac13fef

  • Size

    441KB

  • MD5

    0d2e5727389447563b2ef6fc39b6b9c1

  • SHA1

    aff6bc0564e02ce1c5ec1195a10cbf261b89eadf

  • SHA256

    48fe8e366ffbf8c627e58340fab57c43eadb00ad75f30aeedbe656b7aac13fef

  • SHA512

    2248f9d58300072e2a316acca7b91d12b1c209823d8af29a8bfeb65147c363f6e1a9f3b306913a9683c6400b72d969f4653f0012bc060598f053b4b11284fba1

  • SSDEEP

    6144:ZpwcXoY1dGBQs39vARlHCpQTz27LXsi8IvNAcujPav+ydu9d4oHgw4aRp5E:ZpFqBKlHCOCXsitNAcG34o+

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

adnanchf.no-ip.biz:666

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 48fe8e366ffbf8c627e58340fab57c43eadb00ad75f30aeedbe656b7aac13fef
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections