General

  • Target

    e323f2ad28fe8e71d9fb83713225c8ced4a0a8e476136f4148e56e87a3c64b19

  • Size

    874KB

  • MD5

    46bf2b45aba8668fbf10c295b57b6156

  • SHA1

    b6e9ab8e3fe039b0cb90bf41723f12283843d291

  • SHA256

    e323f2ad28fe8e71d9fb83713225c8ced4a0a8e476136f4148e56e87a3c64b19

  • SHA512

    de4e5caad0334060dc2114e143686ae23f76c1b507b08e1b8eecdba7f92d151e7aee743e5fa68f85881a8944ff380cd35eafe2d1d8686f26e26c30080e63ecc7

  • SSDEEP

    24576:6j8A0qumbPBsJGP6j08QPexwZNwYvN1bY021:6YBqumbJrP6j0xexwZNVvvsh1

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.03.0

Botnet

remote

C2

127.0.0.1:999

runeorder.servegame.org:81

Mutex

HS3702CS2JPDV3

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cornpop21

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • e323f2ad28fe8e71d9fb83713225c8ced4a0a8e476136f4148e56e87a3c64b19
    .exe windows x86


    Headers

    Sections