General

  • Target

    3d8f4067729055565469a53c2d45293e1362c5ffbc0b1111d64be6955739fcc8

  • Size

    4.5MB

  • MD5

    d79c36d344e2fe555bf7da87377f6a7b

  • SHA1

    946e1102a00bad803eda58aa15419ea19c56729d

  • SHA256

    3d8f4067729055565469a53c2d45293e1362c5ffbc0b1111d64be6955739fcc8

  • SHA512

    866f140f81dab1481e17e4278bef57359acc410472efaf4b840bda7849cf05aa3ea80401fd40815d671db1aa82040602cb4f2dd637feb771533681528206fb17

  • SSDEEP

    98304:SSejO8BG0ScKm3ZPDQvoXY/Nk+BV07yM8lIrIrrnTgKr9fyFxxvkOPf:bej40ScKmFEQXe5BdIUHWtkOH

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

fakhorg.ddns.net:8080

fakhorg.ddns.net:23

fakhorg.ddns.net:25

fakhorg.ddns.net:3790

Mutex

PC2XG0R55MOY87

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 3d8f4067729055565469a53c2d45293e1362c5ffbc0b1111d64be6955739fcc8
    .exe windows x86


    Headers

    Sections