General

  • Target

    server.exe

  • Size

    428KB

  • MD5

    660fd7d4f32799358952488703918a32

  • SHA1

    176b0a3a82df03c179718b4e18acc059580b730a

  • SHA256

    30bb20e61044562d371023996d3fea6a92c21d6b01f1ad56f4ef76e04d081ddc

  • SHA512

    86ee6ce4728f165f251a160541a031934c9f7a8ef2342921a49287b6a7ad20bf8db57e9cc25b9854a814487e4bbdb9d82a7e401363a0db755b2b06f375d9df55

  • SSDEEP

    12288:BuMwnBi8vvrHxVPKyv2m77sZB07FxObO32q:BHwU8vrx52t07FQaT

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:999

127.0.0.1:5050

license-itself.at.ply.gg:26287

license-itself.at.ply.gg:5050

181.ip.ply.gg:26287

Mutex

B1X18IO23744K5

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    SVCHOST.exe

  • install_dir

    install

  • install_file

    DiscordUpdate2023.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1234

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows x86


    Headers

    Sections