Behavioral task
behavioral1
Sample
766d8192185bcd2b25f7bda8835db7053b2d1971b69b1e5ae3b0b6c4def9f7d3.exe
Resource
win7-20220812-en
General
-
Target
766d8192185bcd2b25f7bda8835db7053b2d1971b69b1e5ae3b0b6c4def9f7d3
-
Size
428KB
-
MD5
2113219c22a82d3ce12462235559aa30
-
SHA1
c085831f468d0ac225af134bc6fdb41ef4afdfdc
-
SHA256
766d8192185bcd2b25f7bda8835db7053b2d1971b69b1e5ae3b0b6c4def9f7d3
-
SHA512
8d411cf1a9db5fe6bc9ad31c27c1cf8d07859f6bdeec28f6d28e48844365362ce06417ad462b884afb1b7051b7823671a629fd8e9d7b5e2687023c16ccf82f3f
-
SSDEEP
12288:RuMwlBi8vvrHxVPKyv2m77sZB07FxObO32E:RHwy8vrx52t07FQaT
Malware Config
Extracted
cybergate
v3.4.2.2
remote
172.16.7.31:81
4H4RP58QY0HFN2
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Cybergate family
Files
-
766d8192185bcd2b25f7bda8835db7053b2d1971b69b1e5ae3b0b6c4def9f7d3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ