General

  • Target

    9d05c76087b7a55d4de3e75ec5f0b9c80842408e10e36cb0471e1181620b8b64

  • Size

    281KB

  • MD5

    b59471f31cbd6d3e0f2ff088610c83b7

  • SHA1

    9d35ac15ee6f0ad810d28a5f37ac2907891f3107

  • SHA256

    9d05c76087b7a55d4de3e75ec5f0b9c80842408e10e36cb0471e1181620b8b64

  • SHA512

    aa57818a1179286a41f913eab3440e6bc29f5e764f5994b886b4897b075c2240d7023a43f880060fbef57bc9bf7e225be3e353d078b6b796ff15e3adb4b72ec2

  • SSDEEP

    6144:AScrLI4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijt:Rcny78QSVnNyhsFMCeSjt

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Trial version

Botnet

remote

C2

ghazali003.no-ip.org:81

Mutex

1G48R35N4K55A0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    koki55

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 9d05c76087b7a55d4de3e75ec5f0b9c80842408e10e36cb0471e1181620b8b64
    .exe windows x86


    Headers

    Sections