General

  • Target

    449961fce651a78136e5ac4f98bf38d37ca867a412975a87cf60a1935716f152

  • Size

    325KB

  • MD5

    13b004acc954ff4b58d1f7078623f786

  • SHA1

    4a23fae4cc15df1a9fbdd4dad6ec6edf9719b8ad

  • SHA256

    449961fce651a78136e5ac4f98bf38d37ca867a412975a87cf60a1935716f152

  • SHA512

    00f7ada7f41bf26a7e53c06f015a61f40e46fd922ad19ed58f4e842058e7b7a758dbde5cbb420b53e178445b4d20ab9f5d207cddb37a934f17b5ed6246e215a1

  • SSDEEP

    6144:Tk4qmnNg6gjheJfbT8KAWY5sykw/o/zDA+xbSobh+hRGE0K311l/j:o98Ng6yeJfbTaPqkQ/zDMoz011

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

7a2eer

C2

127.0.0.1:81

snake777.no-ip.info:83

Mutex

***hooss***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123455608397

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 449961fce651a78136e5ac4f98bf38d37ca867a412975a87cf60a1935716f152
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections