General

  • Target

    a41e8af0206e0f7d3743459b91fa4af1c5f4dc61f71236217b23ea311cd66330

  • Size

    289KB

  • MD5

    3a29f03d450bb95541d28d107af096c0

  • SHA1

    48680a9795064c024f28fd12191af29a6d673a93

  • SHA256

    a41e8af0206e0f7d3743459b91fa4af1c5f4dc61f71236217b23ea311cd66330

  • SHA512

    4b062ee95dbfcf5cc4b302333044a773301b5adc80ba40078e8cb862b12fbe595aee900e7bdcb7242dfca21375d15fae049dab05468938691b78f166b905f68c

  • SSDEEP

    6144:eOpslFlqshdBCkWYxuukP1pjSKSNVkq/MVJbd:ewslJTBd47GLRMTbd

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

S0litude.no-ip.info:81

Mutex

A8LD7L1R7746XF

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    winupdates

  • install_file

    updates.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • a41e8af0206e0f7d3743459b91fa4af1c5f4dc61f71236217b23ea311cd66330
    .exe windows x86


    Headers

    Sections