General

  • Target

    264b6e8268fef381547a95c9107692f323b58cb95e8ab47390f1cc1a4760b1e8

  • Size

    344KB

  • MD5

    0224d71fd81ee71d7d27c361e859d0c4

  • SHA1

    0735c0bfe54a5576953ee30c833745d3910fef0c

  • SHA256

    264b6e8268fef381547a95c9107692f323b58cb95e8ab47390f1cc1a4760b1e8

  • SHA512

    1fbebc44a1ef012a25c0a74a849cc5fc906f5e405e70058add571d605769c0888d60798405c0e02d2144d3257110dacdf36026b6ee586f3363fa2238097ed619

  • SSDEEP

    6144:CmcD66RW5JGmrpQsK3RD2u270jupCJsCxCBI/9GS:HcD66FZ2zkPaCx

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Msn

C2

mk35.no-ip.org:2535

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 264b6e8268fef381547a95c9107692f323b58cb95e8ab47390f1cc1a4760b1e8
    .exe windows x86


    Headers

    Sections