General

  • Target

    b921f65c45d9f7fb2bf2aeb98d4ad0150f2530d40e36b5d097946f158ed384ce

  • Size

    283KB

  • MD5

    7b7e8b1ff6225d4e1789de227c892a40

  • SHA1

    6ad1fdf8ab0a4f11cd3c61a7481752a00ab62500

  • SHA256

    b921f65c45d9f7fb2bf2aeb98d4ad0150f2530d40e36b5d097946f158ed384ce

  • SHA512

    32c71232811f586e757688e4ea3dc1d204b93d1e2ace911ddb567a99e3b769370666239e3b9826c0bfe8f836b03ff3a461d8f898eddd2d27f26b164e566817bf

  • SSDEEP

    6144:jmcD66RRjk5JGmrpQsK3RD2u270jupCJsCxCM:acD663xZ2zkPaCxH

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

ksa121212.no-ip.biz:200

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Signatures

Files

  • b921f65c45d9f7fb2bf2aeb98d4ad0150f2530d40e36b5d097946f158ed384ce
    .exe windows x86


    Headers

    Sections