General

  • Target

    1174a2abb76d839b62685bb1b1479ac37ba042c13046a1e0793ff3f679b7344e

  • Size

    370KB

  • Sample

    220604-enmvraheg8

  • MD5

    992a3e8dfdf146afe78c55df2413fec3

  • SHA1

    c8998ba4b7bd11eddd1d399196678f53b6f3da66

  • SHA256

    1174a2abb76d839b62685bb1b1479ac37ba042c13046a1e0793ff3f679b7344e

  • SHA512

    214e2a5b323be28011dc1fbd575fa11534e28a15e08028d4280486c3ef746a3dcd837107ddb7dc380f7ade8dda00aa19b7412e6fbadc6c78a93d5a3b9a725e80

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

hack

C2

hoocking.no-ip.org:5000

Mutex

windowss

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    chrome.exe

  • install_dir

    windowslogon

  • install_file

    winlogon32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    no es una aplicación Win32 válida.

  • message_box_title

    error 0x00C1 %1

  • password

    123asd

  • regkey_hkcu

    HKC

  • regkey_hklm

    HKL

Targets

    • Target

      1174a2abb76d839b62685bb1b1479ac37ba042c13046a1e0793ff3f679b7344e

    • Size

      370KB

    • MD5

      992a3e8dfdf146afe78c55df2413fec3

    • SHA1

      c8998ba4b7bd11eddd1d399196678f53b6f3da66

    • SHA256

      1174a2abb76d839b62685bb1b1479ac37ba042c13046a1e0793ff3f679b7344e

    • SHA512

      214e2a5b323be28011dc1fbd575fa11534e28a15e08028d4280486c3ef746a3dcd837107ddb7dc380f7ade8dda00aa19b7412e6fbadc6c78a93d5a3b9a725e80

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks