General

  • Target

    ccebafc1c116ad8b699ce1005cd7e1c0c0472b9b2cb4b4c634e8d03db97a0a2e

  • Size

    622KB

  • MD5

    03b6c0bbb0a40d0e5d17fbe1de002441

  • SHA1

    6ec7c98fe00704c0c50c18629710aabde32d37aa

  • SHA256

    ccebafc1c116ad8b699ce1005cd7e1c0c0472b9b2cb4b4c634e8d03db97a0a2e

  • SHA512

    dec9beada4fe3f150bab1fe8af544221d19b83d92ba78d6135eb2479107da589c208b507bf4483519c94eca5d9ee84afe85871c573c8dec6fd452c4caab34ed3

  • SSDEEP

    12288:spxkLLU19R8ENYfAsSJA8RURcu51P6o3:Cx98ENQeA8Yco1P6o

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÇáßáÈ

C2

kalamkkasarny.no-ip.info:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    windows

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    windows

  • regkey_hklm

    windows

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • ccebafc1c116ad8b699ce1005cd7e1c0c0472b9b2cb4b4c634e8d03db97a0a2e
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections