General

  • Target

    78ee6036b504e7531fdbe7edf9f68e1b980a52d77e490e4dff17298aac153251

  • Size

    1.4MB

  • MD5

    0595a4a2f72f55e4d73581c8d7796c23

  • SHA1

    0e8d0e1ca941dcf6df1ca0aafeeba714cc850977

  • SHA256

    78ee6036b504e7531fdbe7edf9f68e1b980a52d77e490e4dff17298aac153251

  • SHA512

    9eb48a6ba8dbbc6da3d1c863aa9bf27b40c380b96f90ddafa3a06039ec0ed9d87cb7e20d05c7421f49c9621cf1b938d5fb5d260e6a1fe14dcb0c7dad935f974a

  • SSDEEP

    24576:zUnXjeVwX5bXaocaTmud9ZRnY5gJ5BIrVcNPKbkxQmyiSZgfGG:zIXS+NplmGLjBIrGNKbkvyiUgf

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

remote

C2

poetri.no-ip.biz:82

Mutex

70UV7O5245TF2E

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 78ee6036b504e7531fdbe7edf9f68e1b980a52d77e490e4dff17298aac153251
    .exe windows x86


    Headers

    Sections