General

  • Target

    4ad617295cc982ad2121eeb4f5cb75637cc28071f7ee7281804401bbc2d4371b

  • Size

    277KB

  • MD5

    77c515779b7ca41de304a53d4852736d

  • SHA1

    42edbb3f756b7a51eb1056a1d8d59f9819e98b0b

  • SHA256

    4ad617295cc982ad2121eeb4f5cb75637cc28071f7ee7281804401bbc2d4371b

  • SHA512

    b8cb275414fbcd584485e5945944816c0b6fb312fca08a409dc4b0773bea8a0d04a2ee082a87307588cb3a4c1ea8916aef7b73d376eb35d6ba276503ed909ea0

  • SSDEEP

    6144:gk4qmsZWtGxHphDKjmJPC6XoVshvEbBvKcJYsWOqeJX4Y:b9N6G7hDxJC6Xoi6JJYsWcJX4Y

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 02

Botnet

vítima

C2

blacklist.no-ip.info:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4ad617295cc982ad2121eeb4f5cb75637cc28071f7ee7281804401bbc2d4371b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections