General
-
Target
36187823b8301ab80e2737e65ed91d95746525e907638751f7de4151f72f36d3
-
Size
885KB
-
Sample
221003-tey9radhap
-
MD5
634351342f1a1ef5d40bb339d96643a6
-
SHA1
136e4f1c6bdd7124fd1176e6e3366e162c10e1fc
-
SHA256
36187823b8301ab80e2737e65ed91d95746525e907638751f7de4151f72f36d3
-
SHA512
a71173a3988b8d6d8bc7d58ae2ff67c6e658641ec0bb97f607c8993083c50c2d483562ffb950529f6913d62b4048656cda3d1660062e14b064dd0093effdaca6
-
SSDEEP
12288:UaaZ1ozCTtR5ITY9xjUSluZY2LsKmpKwtJ2fx+9/gwZLr+6Ts:92TtD9ZluZYUsK+KwufcdjLhI
Static task
static1
Behavioral task
behavioral1
Sample
36187823b8301ab80e2737e65ed91d95746525e907638751f7de4151f72f36d3.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
v3.4.2.2
remote
sexxpower.no-ip.biz:85
sexxpower.no-ip.biz:1604
sexx.no-ip.info:85
sexx.no-ip.info:1604
Q347X50RK7EWO0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
Targets
-
-
Target
36187823b8301ab80e2737e65ed91d95746525e907638751f7de4151f72f36d3
-
Size
885KB
-
MD5
634351342f1a1ef5d40bb339d96643a6
-
SHA1
136e4f1c6bdd7124fd1176e6e3366e162c10e1fc
-
SHA256
36187823b8301ab80e2737e65ed91d95746525e907638751f7de4151f72f36d3
-
SHA512
a71173a3988b8d6d8bc7d58ae2ff67c6e658641ec0bb97f607c8993083c50c2d483562ffb950529f6913d62b4048656cda3d1660062e14b064dd0093effdaca6
-
SSDEEP
12288:UaaZ1ozCTtR5ITY9xjUSluZY2LsKmpKwtJ2fx+9/gwZLr+6Ts:92TtD9ZluZYUsK+KwufcdjLhI
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-