General

  • Target

    690a2233fff241b6d93c53e297368f959caa40cff3dc019c1e0689c61dbd8ca7

  • Size

    1.4MB

  • MD5

    7141e1f02ddc5e021e96926893368bcb

  • SHA1

    ff0aa7edb6fb13586073fab7d1c740d8d2a7a3c4

  • SHA256

    690a2233fff241b6d93c53e297368f959caa40cff3dc019c1e0689c61dbd8ca7

  • SHA512

    83e7134845ff6b29fa0dfb65a45efb8f4a1504877ae32ba24fcf55b53c40543ee0855151a4d5888a080e807e28d6c6af176de237fe92312482ca742f9b97084c

  • SSDEEP

    24576:CU/MtnESsrjDfvbZEunGu/bKdEZLHQVebAT7VoQUdziPNhXNfLL5Gu9LVbf8Mhoz:CeMeXEPNcOWYB8Q/Me

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

remote

C2

81.198.233.134:888

Mutex

L768PGTN25UL45

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    driverss

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 690a2233fff241b6d93c53e297368f959caa40cff3dc019c1e0689c61dbd8ca7
    .exe windows x86

    88381b84da56810b869e897e6d45bd58


    Headers

    Imports

    Sections