General

  • Target

    8143c87fd9cf1efea8e1f06dfdec12b58e8094f142ea2e104838083c1d4ec281

  • Size

    290KB

  • MD5

    0081121e1e66a6851bca5d1d73fab98f

  • SHA1

    60188716113fd72e5562b21ba48bce8138411aa2

  • SHA256

    8143c87fd9cf1efea8e1f06dfdec12b58e8094f142ea2e104838083c1d4ec281

  • SHA512

    b2d6215c6a58e0f0eeaf03f077213050e27f3d58e45f25b16a33660e2b5e274e5cfa72a6d098a104b2126eef36731d4e87af3270050b6277008b0e449dea0b3d

  • SSDEEP

    6144:lOpslFlqbhdBCkWYxuukP1pjSKSNVkq/MVJbZ:lwslsTBd47GLRMTbZ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

xxxh4ckxxx.zapto.org:81

Mutex

JW085JLR136E51

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 8143c87fd9cf1efea8e1f06dfdec12b58e8094f142ea2e104838083c1d4ec281
    .exe windows x86


    Headers

    Sections