General

  • Target

    9c5cbfd4bf403a40f1206ed6078490bfa1c8650c265ff0f662534a059b562725

  • Size

    428KB

  • MD5

    39affdd0966aeb832abaf598c39bcd0d

  • SHA1

    331769da2a7b633e3c03a5ff3e82285a91535352

  • SHA256

    9c5cbfd4bf403a40f1206ed6078490bfa1c8650c265ff0f662534a059b562725

  • SHA512

    f887396647226dafcf4a3713134afe0e13dede1bbf3738aa08af6503860d71f8b34b161450d5d6db9511bd893ae5e50bb7772f2d82a60cdc2264a8f86e33ac5c

  • SSDEEP

    12288:huMwiBi8vvrHxVPKyv2m77sZB07FxObO32B:hHw78vrx52t07FQaq

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

206.53.58.184:446

Mutex

3K2CMR44JJH1K3

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    Sq.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9c5cbfd4bf403a40f1206ed6078490bfa1c8650c265ff0f662534a059b562725
    .exe windows x86


    Headers

    Sections