General
-
Target
f988ab48c019b94c4fbf79b022750062b015fff5fb5adaab4cef4fc9a3d0d11e
-
Size
275KB
-
Sample
221002-jwtqgsegd3
-
MD5
6fe2a21ac2a57113164a96c7cce482ee
-
SHA1
34086daa18664ee5b774db6fd43386af12cdc4a0
-
SHA256
f988ab48c019b94c4fbf79b022750062b015fff5fb5adaab4cef4fc9a3d0d11e
-
SHA512
2cd959c6c7bcb6f612bc5b3b3399f85603eeaa0bde3af9ecb98d51ad55c3824eb2a2d13f80e64a69e94d11a6e971bd8a2d558ed68fa58e4afcfe5a05c4613f3a
-
SSDEEP
6144:qMIXAJ8by0noCRLYrV+MkIXwR3aWJWXXUTr3sSyLP:qbXIiy0oQLsrXCaIWXkTr3/y
Behavioral task
behavioral1
Sample
f988ab48c019b94c4fbf79b022750062b015fff5fb5adaab4cef4fc9a3d0d11e.exe
Resource
win7-20220901-en
Malware Config
Extracted
cybergate
v1.07.5
remote
109.169.40.133:43594
6H1130RDF6NNX4
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
test bind :)
-
message_box_title
test works
-
password
9632
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
f988ab48c019b94c4fbf79b022750062b015fff5fb5adaab4cef4fc9a3d0d11e
-
Size
275KB
-
MD5
6fe2a21ac2a57113164a96c7cce482ee
-
SHA1
34086daa18664ee5b774db6fd43386af12cdc4a0
-
SHA256
f988ab48c019b94c4fbf79b022750062b015fff5fb5adaab4cef4fc9a3d0d11e
-
SHA512
2cd959c6c7bcb6f612bc5b3b3399f85603eeaa0bde3af9ecb98d51ad55c3824eb2a2d13f80e64a69e94d11a6e971bd8a2d558ed68fa58e4afcfe5a05c4613f3a
-
SSDEEP
6144:qMIXAJ8by0noCRLYrV+MkIXwR3aWJWXXUTr3sSyLP:qbXIiy0oQLsrXCaIWXkTr3/y
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-