General

  • Target

    901a4d508852aa9bd3d52da40fa6b31b1699fa7df7e896c2d05cbbb7071d25fb

  • Size

    281KB

  • MD5

    0937d4850c4e5d4d599b2059a6d41e85

  • SHA1

    759b834884d026316071a9161e6c6a3f8d9e06fa

  • SHA256

    901a4d508852aa9bd3d52da40fa6b31b1699fa7df7e896c2d05cbbb7071d25fb

  • SHA512

    3b2082a315ea90293a77c327450aef7de7fea87032ec7bb7f55f19aa9797efd41fd21da8735c0ee408308f5eff5f95607fe8a7a57c7feb3967f5ae5847215f03

  • SSDEEP

    6144:AScrLY4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijp:Rcny78QSVnNyhsFMCeSjp

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Trial version

Botnet

Crypted!

C2

xtreme123.no-ip.biz:4500

Mutex

65W7EPCLMATI5K

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    explorer

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Failed To Load

  • password

    royalxkios

Signatures

Files

  • 901a4d508852aa9bd3d52da40fa6b31b1699fa7df7e896c2d05cbbb7071d25fb
    .exe windows x86


    Headers

    Sections