General

  • Target

    f296b1aec0a33147e1ddf3c6ef58964f06e4e337d445059c6f18f7bea000dcf3

  • Size

    289KB

  • MD5

    42deb207036b3a3e3c9cbbe95487dd6b

  • SHA1

    f4c77ad7d41e7f87021ffbb18e5880771123c9fa

  • SHA256

    f296b1aec0a33147e1ddf3c6ef58964f06e4e337d445059c6f18f7bea000dcf3

  • SHA512

    88b61ef4b621d5508f195713814c4183741cc5431a3f804dcc2ab90a8da1f532cef695a125759d99a1845f9595f6d717dd713ded037178504e1f57a11d802ba1

  • SSDEEP

    6144:2OpslFlquhdBCkWYxuukP1pjSKSNVkq/MVJb6:2wsl1TBd47GLRMTb6

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:6335

Mutex

081T3YH70D6RD4

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    ikaros

  • regkey_hkcu

    1

  • regkey_hklm

    1

Signatures

Files

  • f296b1aec0a33147e1ddf3c6ef58964f06e4e337d445059c6f18f7bea000dcf3
    .exe windows x86


    Headers

    Sections