General

  • Target

    68cbb2fe79ffdb2cc50a5b788f4a5ab95899f49e497512f606c5a16a4e44c0d0

  • Size

    289KB

  • MD5

    4352e07fc1fc0c7e40a8984a50a1494d

  • SHA1

    70a9552629daccb28f8b75eba1948d35328a2937

  • SHA256

    68cbb2fe79ffdb2cc50a5b788f4a5ab95899f49e497512f606c5a16a4e44c0d0

  • SHA512

    2345366f9814965701c3af207228355c3a8eb855e96245ec29974290975644755ff0fc00f1471c2e416426d4016e0d57f04f9b8d1a4c74f0053ce8ba55f202ea

  • SSDEEP

    6144:eOpslFlqphdBCkWYxuukP1pjSKSNVkq/MVJbr:ewslITBd47GLRMTbr

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

done

C2

tascoly1100.ddns.net:6900

Mutex

03C11Y76K6K3E8

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345

Signatures

Files

  • 68cbb2fe79ffdb2cc50a5b788f4a5ab95899f49e497512f606c5a16a4e44c0d0
    .exe windows x86


    Headers

    Sections