General

  • Target

    a42c27c804efb0c7ede748822e4ae49bf29bbcd6b663ac877c33c4c2cf60973e

  • Size

    296KB

  • MD5

    033b39eefceb61d01c793441a73626fd

  • SHA1

    e80145638e1b41b53a290d9615a19c2af255bb32

  • SHA256

    a42c27c804efb0c7ede748822e4ae49bf29bbcd6b663ac877c33c4c2cf60973e

  • SHA512

    ec2bf2881c8ecf2dcba9c74991867f6f21e70075af7f7c788cbe72c2c553037613e4b919644066be824af41d92229152670de76a8a7233869595d648d93157df

  • SSDEEP

    6144:POpslFlqRhdBCkWYxuukP1pjSKSNVkq/MVJbO:Pwsl6TBd47GLRMTbO

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

admin

C2

usfmemorys.no-ip.org:25565

Mutex

UDEY1E60CHP174

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    sphack

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    appels

Signatures

Files

  • a42c27c804efb0c7ede748822e4ae49bf29bbcd6b663ac877c33c4c2cf60973e
    .exe windows x86


    Headers

    Sections