General

  • Target

    1c788c1a4fdb8bcfc41fc4a5f37196f5ecebab980ccd79c1bbfa24e92e60cfd2

  • Size

    296KB

  • MD5

    79cd87005fb70d193a7fffe76fdeb7c2

  • SHA1

    387d2bc960cc2ed41bfda4de334007a95d5cdc22

  • SHA256

    1c788c1a4fdb8bcfc41fc4a5f37196f5ecebab980ccd79c1bbfa24e92e60cfd2

  • SHA512

    37bdd14622e868c7a8fdc96ca815a410b2ddeffb71ec83ffdc60a9bb08333e972509de56248bd458a558ad035f40ff03996f20eb6cc58b91fb8dcb1630742ec6

  • SSDEEP

    6144:POpslFlqMhdBCkWYxuukP1pjSKSNVkq/MVJbw:PwslPTBd47GLRMTbw

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:1609

Mutex

EI7Q4H4202PUSM

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    schost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Current FrameWork not supported.

  • message_box_title

    .Net Framework

  • password

    123456

Signatures

Files

  • 1c788c1a4fdb8bcfc41fc4a5f37196f5ecebab980ccd79c1bbfa24e92e60cfd2
    .exe windows x86


    Headers

    Sections