General

  • Target

    ab4fd5313e3fac585c04d0a6735724fac0824bb6a06efc8bb6b1b9aa1a6948b3

  • Size

    277KB

  • MD5

    53bd7b9ee969bced0bb4b0f62fd0772e

  • SHA1

    a7cb2cb9efa73c4873b7a8f6bb1479b2783a6667

  • SHA256

    ab4fd5313e3fac585c04d0a6735724fac0824bb6a06efc8bb6b1b9aa1a6948b3

  • SHA512

    87d5df224b81fac0b323af9012c4716d1dd795dad1afc0c413a4af181b497b35205ff67f7d3113bb2bc35129c6fbcc2f42605595ccb4148acad4c6b5b1b18f3f

  • SSDEEP

    6144:ak4qmsI+RGqjMsKslxSwQvu49myE8KjhFE2kuT0Vfo5J2N//YL5A4v:F9DndlYwQvu49mgODkzUJ2N//o3

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 02

Botnet

chiheb

C2

hack-bifrost.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    chiheb

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • ab4fd5313e3fac585c04d0a6735724fac0824bb6a06efc8bb6b1b9aa1a6948b3
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections