General

  • Target

    ae21229a5e143f20eb85863abba2f4e68e2964bdefa932507be33c75a4d8718e

  • Size

    289KB

  • MD5

    a3c34229a2aaa5d9a54aff5306188a7a

  • SHA1

    72a3bc33fec8570b68d02971209feb0cae55fbca

  • SHA256

    ae21229a5e143f20eb85863abba2f4e68e2964bdefa932507be33c75a4d8718e

  • SHA512

    bbad510734d0013364f1a5afb0a9035d603173152db8c41e0678e176163d9158a2206f67101b2916266ce60ba7efc8001a534e1aadb8347105404ee46411b93c

  • SSDEEP

    6144:mOpslFlqwhdBCkWYxuukP1pjSKSNVkq/MVJbU:mwslVTBd47GLRMTbU

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

FRIDAY HOPE

C2

kimjoy.user32.com:2014

Mutex

25041K2E0WE40C

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345

Signatures

Files

  • ae21229a5e143f20eb85863abba2f4e68e2964bdefa932507be33c75a4d8718e
    .exe windows x86


    Headers

    Sections