General

  • Target

    a7a95e0a73a84c3a4b7a315f4f8ef884cc1c754183fdfcb00cc274496e2aa462

  • Size

    276KB

  • MD5

    0ba9a3418c7731d775b2edd321e54f99

  • SHA1

    b10fad1b22fbd334f1cea203f69e3ae90237361e

  • SHA256

    a7a95e0a73a84c3a4b7a315f4f8ef884cc1c754183fdfcb00cc274496e2aa462

  • SHA512

    7aa892292c837c147fc3dcb55ec7a9b82fbf003f4d4301c1b206585a5d37f884e11abf5c5147d0e4386f8d6f43ec50573945f1036b9036cce36687e267ec95a6

  • SSDEEP

    6144:0k4qmO1y+E1WWxgKMBG2p9fWfU/foUSn/3oG50Nr3q:X9hyX1WWxgNp9u0N

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

127.0.0.1:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a7a95e0a73a84c3a4b7a315f4f8ef884cc1c754183fdfcb00cc274496e2aa462
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.