General

  • Target

    eb3b1a8406e54df68f4d211425b4a4f9c1ccd1e9d005ff4ae398eab26f956dcb

  • Size

    289KB

  • MD5

    608cae52f0f9716b0b156ef3b8473ec8

  • SHA1

    15a9569efa5f516fa4bc66127e9dd1d7585d369a

  • SHA256

    eb3b1a8406e54df68f4d211425b4a4f9c1ccd1e9d005ff4ae398eab26f956dcb

  • SHA512

    162dfa2f4a0c9d9d85d7bbcafa59675ccbc78142644597dd83c3c1140bef56efb4a5c6a7596caa2b580950250d9adabfc0c07ccff2097587cf2e5e2d94dadec5

  • SSDEEP

    6144:GOpslFlq4hdBCkWYxuukP1pjSKSNVkq/MVJbj:GwsllTBd47GLRMTbj

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

jaun Ol

C2

127.0.0.1:88

Mutex

X47C3N88B06GXA

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    windows

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • eb3b1a8406e54df68f4d211425b4a4f9c1ccd1e9d005ff4ae398eab26f956dcb
    .exe windows x86


    Headers

    Sections