General

  • Target

    server.exe

  • Size

    427KB

  • MD5

    2b541ce551764cda4ec19cf40a6d62a6

  • SHA1

    284969a5d4a4437199dc529226191cad976c2206

  • SHA256

    269aff53e58f71f5893d6d4bb552e57ab3f56d8b797259f8ed9a3ffc18a295b4

  • SHA512

    249882eb640013cd0d088241340ff21b601a47967aad8cd0e8afd802fc3824db6e5c7f9d77574958e1615542424deebe5b86d29bb609a3f5b0b8988d7d6d3199

  • SSDEEP

    12288:FuMwCBi8vvrHxVPKyv2m77sZB07FxObO32k:FHwb8vrx52t07FQaX

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:999

127.0.0.1:81

Mutex

NCK75D3YUE7Y2D

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    hgf

  • install_file

    hgf.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows x86


    Headers

    Sections