General

  • Target

    cb93341e97fc950c8635286ee597021acc170e0a57088ade079820fc4259ebc9

  • Size

    284KB

  • MD5

    4290e8da26d7c3cde103043fb26ebe55

  • SHA1

    c249233b54bcc67e5e672e4306b49e4116c3ea26

  • SHA256

    cb93341e97fc950c8635286ee597021acc170e0a57088ade079820fc4259ebc9

  • SHA512

    154899b6a290ca54114e278d7a7641c1dffe67c65e4dc03213e743d825521360d5d7fa3c289680aaa8731a030c70d5eebb356265ad431683b65c27f26a176971

  • SSDEEP

    6144:ik4qmjn1rMVCgFHaV5op3V93OdMezcfZqSMHDJGzrL70EiJJ:d9SICOaV5i6GeUZqHjK0bJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

SPY

C2

m-jnoon.no-ip.biz:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • cb93341e97fc950c8635286ee597021acc170e0a57088ade079820fc4259ebc9
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections