General

  • Target

    d002d4f30f50b84b5506b60e0263572b23105b733d118e97bcfbc48d81d70fde

  • Size

    321KB

  • MD5

    0c2346b95b3f0956c97a388de22bde72

  • SHA1

    9221b4caf1fb52d11a6cf99aa3ba4c4681636deb

  • SHA256

    d002d4f30f50b84b5506b60e0263572b23105b733d118e97bcfbc48d81d70fde

  • SHA512

    d49d74d47ff7403d8b175b8acda4906a33ed5f5011b9b11a9b4556b20e5c04d492f4b416b39afacebb8b3e869abba23b3d5fe593d05f6403110ece2e720912c2

  • SSDEEP

    6144:F4ABF948hnipAuO/50BTnqPd0Mpz7qhh4nXjjf8MZ9BKXK8:uUFVJGLE0kuGnESB8

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Cyber

C2

tinkuz.no-ip.biz:999

Mutex

4Q0FUF5N3EP14P

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    flooder2013.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • d002d4f30f50b84b5506b60e0263572b23105b733d118e97bcfbc48d81d70fde
    .exe windows x86


    Headers

    Sections