General

  • Target

    ed88eeb3212ea3baf8ebf60fcb757f662040c24ae8325c1c752dbbe12f753684

  • Size

    289KB

  • MD5

    e65b6594a9a1412ec2f04abcd4291e4c

  • SHA1

    3d9f7b0e8e93052cd9686278f8d77a91356a2001

  • SHA256

    ed88eeb3212ea3baf8ebf60fcb757f662040c24ae8325c1c752dbbe12f753684

  • SHA512

    f1e7c8dfaf88f4afa68d1566e699b2b2006ef0864e6ba6f5973250a43832234e8a0301f958e6d0f407a9168f9907e75d6b56dbccf5c8a47c3e42f022e5c94e95

  • SSDEEP

    6144:GOpslFlq+hdBCkWYxuukP1pjSKSNVkq/MVJbj:GwslrTBd47GLRMTbj

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

osama

C2

94.43.198.184:999

Mutex

M5WQ3M1M346F45

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    osama

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • Cybergate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ed88eeb3212ea3baf8ebf60fcb757f662040c24ae8325c1c752dbbe12f753684
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections