General
-
Target
1968-41-0x0000000000400000-0x0000000000457000-memory.dmp
-
Size
348KB
-
Sample
231025-hkbvvseg83
-
MD5
84a4fc73ee493f4958cc3c34cfdf8b53
-
SHA1
2c8d5e32724b37914f45e321e80b21105834f76e
-
SHA256
bd5b1ad04a8234f5de6aead57c7855fb0fd8663f1ac48e38ca4ca2628e35ad75
-
SHA512
b0c162a5d23bae3393ecff8f14fec9fc2510cfa8b30b9cce68536c9888608457b141534b37d3bba1f1a7824c81f110ff91f7a875333191b6091dc3a04034cd3f
-
SSDEEP
6144:r+mcD66Rr5JGmrpQsK3RD2u270jupCJsCxCXIrFy:fcD668Z2zkPaCx
Behavioral task
behavioral1
Sample
1968-41-0x0000000000400000-0x0000000000457000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1968-41-0x0000000000400000-0x0000000000457000-memory.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
cybergate
2.6
Victima
boxdmz.freeddns.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
COM HOST.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
gxwd
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
1968-41-0x0000000000400000-0x0000000000457000-memory.dmp
-
Size
348KB
-
MD5
84a4fc73ee493f4958cc3c34cfdf8b53
-
SHA1
2c8d5e32724b37914f45e321e80b21105834f76e
-
SHA256
bd5b1ad04a8234f5de6aead57c7855fb0fd8663f1ac48e38ca4ca2628e35ad75
-
SHA512
b0c162a5d23bae3393ecff8f14fec9fc2510cfa8b30b9cce68536c9888608457b141534b37d3bba1f1a7824c81f110ff91f7a875333191b6091dc3a04034cd3f
-
SSDEEP
6144:r+mcD66Rr5JGmrpQsK3RD2u270jupCJsCxCXIrFy:fcD668Z2zkPaCx
Score1/10 -