General

  • Target

    f0fcb5d418f2005bd61b41e162edca65cbb49f2e35196752d87a40dc42b69035

  • Size

    284KB

  • MD5

    0b6e06a9fc958a91956a006fe821f566

  • SHA1

    dc8750e693636e5491bc7b31874cd3d42962f103

  • SHA256

    f0fcb5d418f2005bd61b41e162edca65cbb49f2e35196752d87a40dc42b69035

  • SHA512

    7d87bc2f4ac354affc62570cf2776070e8f79851529385c6834797d25f16ae458ae0fcc09fcc3f335d9e8b0093977af66d45f0372012f9137a56de60f3297547

  • SSDEEP

    6144:1k4qmONoTz28Xdp3eAS7k3QZUYSDxKF2ys6RMdDl:S90Ti8XzOU3QZIo2yed

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f0fcb5d418f2005bd61b41e162edca65cbb49f2e35196752d87a40dc42b69035
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections