General

  • Target

    06e16b40add5f56f598a24c0b1049d85

  • Size

    295KB

  • MD5

    06e16b40add5f56f598a24c0b1049d85

  • SHA1

    32073e427bd139bfa9c47a7d4135a46b79c4daf6

  • SHA256

    0c57e86da1d97d2704c12683f06675559c14d5a093bc2bec4cc5a463fa96e2d5

  • SHA512

    1e69e0379f0834970da8309919f4671d2be01cc664320efa63fe1bc8ebbbc1b070e7db4b86fe789d086b2716d13f7819a5c0a2d2db1be554386cb63a58cf6508

  • SSDEEP

    6144:9mcD66R7d5JGmrpQsK3RD2u270jupCJsCxC:ocD66eZ2zkPaCx

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Crossfire3

C2

test123.dontexist.org:8003

meh123rawr.hopto.org:8003

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    MicrosoftPolicies

  • install_file

    MsPolicy32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Runtime Error 4327. Please try running again.

  • message_box_title

    Error!

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 06e16b40add5f56f598a24c0b1049d85
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections