General

  • Target

    c72e6a661e82ba350a119c807bc9939ac1f53c6d7f13dc7b30f30aef57e8c1db

  • Size

    281KB

  • MD5

    eb35f2f33bf1261f458d364b0f9b8958

  • SHA1

    5d495227a8033cf29924055a9433449dfaf52ee3

  • SHA256

    c72e6a661e82ba350a119c807bc9939ac1f53c6d7f13dc7b30f30aef57e8c1db

  • SHA512

    55d6e1ea379d9f6218fa7c4d98f1f9d83e28b8474d5e7098e278730e1ea3888f8fa17a2221a6f7150a0380bc9eebc776189c4c5a535ae12cf999ef734020c5bc

  • SSDEEP

    6144:gScrL/4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXidX:xcIy78QSVnNyhsFMCeSdX

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

merabti01.no-ip.info:288

Mutex

X7777T320210SE

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • c72e6a661e82ba350a119c807bc9939ac1f53c6d7f13dc7b30f30aef57e8c1db
    .exe windows x86


    Headers

    Sections