General

  • Target

    a605d996ab5121359005f5f154f7c07e6e8df06e4d3c11f3480f87de0c6039ee

  • Size

    277KB

  • MD5

    1ade751b55f355b1bc67d70252edfca8

  • SHA1

    47b295b057cb4a874a880ac71f2566592b128a8c

  • SHA256

    a605d996ab5121359005f5f154f7c07e6e8df06e4d3c11f3480f87de0c6039ee

  • SHA512

    ae39bdca1bd3384a699148a31207957a39f67f045c005b8ed09bf76c70f68510b6fca35a412849aa911a8a744b18cb19b3588e4fa3fe9e2a92d12ae752b868de

  • SSDEEP

    6144:/yuMImiCdfL2m7mrUsqWBn837FNldObO3k1jU:quMzX2m77sZB07FxObO32g

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:999

Mutex

S5WVSIL65HA800

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    towby

Signatures

Files

  • a605d996ab5121359005f5f154f7c07e6e8df06e4d3c11f3480f87de0c6039ee
    .exe windows x86


    Headers

    Sections