General

  • Target

    debfd3472a4335119c1c1adfdfd930f2d77c8acfd15195844d4492c5ee38d2cc.exe

  • Size

    346KB

  • MD5

    0c33ab5470f0f823a63f98231d6a65ca

  • SHA1

    6509d826b16f19045dc92ac3cdbe77be12514773

  • SHA256

    debfd3472a4335119c1c1adfdfd930f2d77c8acfd15195844d4492c5ee38d2cc

  • SHA512

    6c77357d276a0006ffe55f9a1da77dd3d6852c5f27ae241099d86c2371f4082711de8d15382cb18ba279bbeb471656de8172986475efc1e7311f7ddb60472543

  • SSDEEP

    6144:rOpslMhdBCkWYxuukP1pjSKSNVkq/MVJbUIid:rwslMTBd47GLRMTbc

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

127.0.0.1:100

Mutex

72VVM22OJVEN02

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Signatures

  • Cybergate family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • debfd3472a4335119c1c1adfdfd930f2d77c8acfd15195844d4492c5ee38d2cc.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections