General

  • Target

    ad573cec103deca5ba4c0fb90a31c6c6bf2c29752197d916be3a1604cbc1af18

  • Size

    290KB

  • MD5

    1edc10e114e73682463638868b63a8b5

  • SHA1

    1299edabc13c017f4a83c6b90ac45b4cf028bc0f

  • SHA256

    ad573cec103deca5ba4c0fb90a31c6c6bf2c29752197d916be3a1604cbc1af18

  • SHA512

    773aab964e99a063152f0596cc50ff0ea98e1b7688b2968b552221a10b6e29bc67b639e584d8cd6e9168454b635585818411a46c9c40a41211a6806e6e7183c7

  • SSDEEP

    6144:MmcD66RRj15JGmrpQsK3FD2u270jupCJsCxC+:9cD663Q92zkPaCxR

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

etakstata.no-ip.org:2213

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Windows

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • ad573cec103deca5ba4c0fb90a31c6c6bf2c29752197d916be3a1604cbc1af18
    .exe windows x86


    Headers

    Sections