General

  • Target

    server.exe

  • Size

    428KB

  • MD5

    319e19e417c6254fc96d66fa9f1fc5eb

  • SHA1

    b0a8cea81ba08cd9d7f0e2993b542efe83286ba4

  • SHA256

    adfcdb640c1f587ddf80cd89198326f66296105d08887bfeebd4311f23d9c867

  • SHA512

    269e2aa74eb547cf8750583b1f79fe9026b3517aca219bf651e5bce4b2cb3b9600966afad14686e5515f3977056ae2324ede49fd3678fda5ec3b78a1b452cee8

  • SSDEEP

    12288:xuMwlBi8vvrHxVPKyG2m77sZB07FxObO32U:xHwy8vrxA2t07FQaJ

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:999

Mutex

UKMA027OP5RDCR

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • server.exe
    .exe windows x86


    Headers

    Sections