General

  • Target

    7eacbd7c3ae7ffa40d2048593d363d7d

  • Size

    642KB

  • MD5

    7eacbd7c3ae7ffa40d2048593d363d7d

  • SHA1

    524cc907017e1f2315df360c20caf20a2ab2fb09

  • SHA256

    3b8bcc9340753f1f8a255d1b98d4ab1398f73f447f45acccb9800b81eccb2ca2

  • SHA512

    c76682993df2d7e7469bfd0df60822c7673ca313ea4956726aa98ad20ed5a0a55349c2dd9a9aa86c383d5afe6e02bfab1d39644873de20b41fcede371075c228

  • SSDEEP

    12288:0cD663AQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQRA:0nLtwCc26uGi2VCHXSBzTaDMsAQRA

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

192.168.0.7:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • ftp_password

    ªš÷Öº+Þ

  • ftp_port

    21

  • ftp_server

    ftp.server.com

  • ftp_username

    ftp_user

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7eacbd7c3ae7ffa40d2048593d363d7d
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections