General

  • Target

    a973f142ec936324d26c51953060482f406ee28a9a3bd6e8b5d4cd47e7041b86

  • Size

    284KB

  • MD5

    4bb6f14c0e4f2839c17a9e8888faac52

  • SHA1

    9d0bd8fbfc775b3eab7ca4a56f4ea7b3f8ad6dd9

  • SHA256

    a973f142ec936324d26c51953060482f406ee28a9a3bd6e8b5d4cd47e7041b86

  • SHA512

    fbc59af4ed1fbd82a43c860f96253824629e2e88d31694fb0c5d782fa0e919f10d03bd849eabb3a39f461ea4eea711b8d64ffbf961762ea2cc48127587554a2e

  • SSDEEP

    6144:Zk4qmMkH3YYZmc9PGEJF5d4+75ikkGlv92kP:+9QZmyPj4+hpv9

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

maansaif.zapto.org:85

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a973f142ec936324d26c51953060482f406ee28a9a3bd6e8b5d4cd47e7041b86
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections