General

  • Target

    314101b9cd89bce6951fc627c9d5f1b8a72fa5647028d5d7d545c22abd247464

  • Size

    284KB

  • MD5

    32b9b4194cbded621a789124bb6f9810

  • SHA1

    3a9a295e2385fe4d7b5fa85ef6622a5d280ded4f

  • SHA256

    314101b9cd89bce6951fc627c9d5f1b8a72fa5647028d5d7d545c22abd247464

  • SHA512

    13887e61ecc25da05b57ef68c9706b62cf79c89b65fa932f6f371b2c1516c93a1421f4a7ebaa47a51c8eaea40e151e2aaf85a028e2780ff188c023a41feec59f

  • SSDEEP

    6144:/k4qmfmPK/fTlTwIvaqpNWjU7nWsd8qfiG4LcMjv:M9YHwsMKV13M

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

zezy403.no-ip.org:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 314101b9cd89bce6951fc627c9d5f1b8a72fa5647028d5d7d545c22abd247464
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections