General

  • Target

    d1c1f7f6f9cf3473ae8073235fbafdbff454888eb378a38dac564cc32d2a1b28

  • Size

    296KB

  • MD5

    d65cb062ab36216061d3e5e4dabf5126

  • SHA1

    ebdf643e8cef672e4d82c41faacb89e529e578cd

  • SHA256

    d1c1f7f6f9cf3473ae8073235fbafdbff454888eb378a38dac564cc32d2a1b28

  • SHA512

    e0cbc8ff356c68512a70f528e323245344d534f3a8519d75a16b48a9a2f3e3875571f84542d145781d5892a9d81f25e151af2d5f4a86935e3e6de82387432e93

  • SSDEEP

    6144:fOpslFlqmhdBCkWYxuukP1pjSKSNVkq/MVJbu:fwslHTBd47GLRMTbu

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

spraslhivai.no-ip.info:12345

Mutex

B58452Q8WE2HPO

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./ss/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    installl

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • d1c1f7f6f9cf3473ae8073235fbafdbff454888eb378a38dac564cc32d2a1b28
    .exe windows x86


    Headers

    Sections