General

  • Target

    b0a2021cfec75c7a3e0fba0c5ae87656c7b34627f87e0ab989c0788807d149ba

  • Size

    208KB

  • MD5

    b25d1b89c51873236572f15228e11b4c

  • SHA1

    57b98ea99ff194b3f07fcb5b5ff190b9cc859ebc

  • SHA256

    b0a2021cfec75c7a3e0fba0c5ae87656c7b34627f87e0ab989c0788807d149ba

  • SHA512

    d24285100d69ca609a456a80b83d191dd4616227eee5e91531e7630dce9b28727ac74b4bca03f3df194256bfdb6e726c5081c4a26180685272309e2ad56fa23a

  • SSDEEP

    6144:gScrL24mp8D6WGc/YSlIipBReubLzeh7Yy06:xcpy78QSVnNyhsU

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

creed.zapto.org:11000

192.168.1.2:11000

creed.myftp.org:11000

Mutex

08C8666KEIC770

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    web

  • install_file

    scvhosts.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    becool

  • regkey_hkcu

    HKCU

Signatures

Files

  • b0a2021cfec75c7a3e0fba0c5ae87656c7b34627f87e0ab989c0788807d149ba
    .exe windows x86


    Headers

    Sections