General

  • Target

    d286deab81679504b384f5d5ffc9b528a1a9bc3edc50e69546ba6d1896656d64

  • Size

    284KB

  • MD5

    0f0b4174586a26a5e444fada15e5bdd2

  • SHA1

    d87edbd8a1584738a59b3269a1f7308a29f182b0

  • SHA256

    d286deab81679504b384f5d5ffc9b528a1a9bc3edc50e69546ba6d1896656d64

  • SHA512

    535d465dd397f8b4b751e8c0842074e126692e12b348c415845796fdf94d1b3a95c42855b1cb00b5e31da38b69b64b29d7b686cb2b00c100f3ca429ae159cb7f

  • SSDEEP

    6144:ck4qmDGIUVK8DFOamnB26Twq88r+/AWejaoK2wU:v9pK8pOf/Mq8Q4Ci2w

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

zzxcascse333wqwe2.no-ip.biz:3460

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    Win_Xp.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please try again later.

  • message_box_title

    Error

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d286deab81679504b384f5d5ffc9b528a1a9bc3edc50e69546ba6d1896656d64
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections