General

  • Target

    95f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca

  • Size

    289KB

  • MD5

    f3bf34fbcc5d4d8238c81080feba57c1

  • SHA1

    0c9c5500054b5e8c90f1e781730a8eee69fc6fb3

  • SHA256

    95f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca

  • SHA512

    b3142958210017056f06e10db8f32840aff12a2aa36068735614cf818cf6fde7cb0c4a2f67d73996605672467058b064a2b4532acdc1e77020078075e2ea59b3

  • SSDEEP

    6144:mOpslFlqNhdBCkWYxuukP1pjSKSNVkq/MVJbU:mwslwTBd47GLRMTbU

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Clients

C2

abapaul.ddns.net:3450

Mutex

MQ17T531JROJ0H

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    MUI

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345678A

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 95f8ed76dee24539a80d5e7bc1c16b3cb553e4eff97bf7aeb265e507edbf36ca
    .exe windows x86


    Headers

    Sections