General

  • Target

    2cffa131ca8092a41098cd71913f4070

  • Size

    281KB

  • MD5

    2cffa131ca8092a41098cd71913f4070

  • SHA1

    ed2e6bcea13e680be0e4d58a979644354a578a44

  • SHA256

    74849ee228e4173e102774b49c8b53836200d7b8b540ca1c2b3d9436d6a75f34

  • SHA512

    d94118a0bd79e0d0eb2bba995f64b1455157ac0f780ad42956d0ceb9026ab4fc415028908f0f5827f7a87de67b1ba91474f8081f05b90fd608c6af2121865816

  • SSDEEP

    6144:gScrLtk4mp8D6WGc/YSlIipBReubLzeh7Yy0DMIdeXijE:xc1zy78QSVnNyhsFMCeSjE

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Trial version

Botnet

hacked

C2

127.0.0.1:999

hackwahid.zapto.org:81

Mutex

B201JU88W47140

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./

  • ftp_interval

    30

  • ftp_password

    D7g4XAb2xx

  • ftp_port

    21

  • ftp_server

    46.105.97.186

  • ftp_username

    wzwaxcra

  • injected_process

    explorer.exe

  • install_dir

    wahid

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Restart

  • message_box_title

    Error

  • password

    22091997

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2cffa131ca8092a41098cd71913f4070
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections