General

  • Target

    a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6

  • Size

    356KB

  • Sample

    221011-b57dyahfc3

  • MD5

    7bf7a3959ad1b024a2b22ccd5d4387a0

  • SHA1

    34a0476e3339707a75c4b852c535a3177ad4da51

  • SHA256

    a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6

  • SHA512

    b254a0cdead57e7a28784ce402b4424f19a33c5ffe457d67ba35d174795f670257d124a9d0133d22107f1e287bc6635f8944bfdd5407b7477e436a9d68d7cf47

  • SSDEEP

    6144:VTfq8aL+jyORFsyRw5nVgOrkTxPcv/BnAtTHIw2hPVd+t3kfWeIDvxH5wCK/VVRA:Vi83ayaHkTOHETHz2fm8RIjxZU/VVRXw

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

victime

C2

moi1000.no-ip.biz:1000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    system32

  • install_file

    win32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6

    • Size

      356KB

    • MD5

      7bf7a3959ad1b024a2b22ccd5d4387a0

    • SHA1

      34a0476e3339707a75c4b852c535a3177ad4da51

    • SHA256

      a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6

    • SHA512

      b254a0cdead57e7a28784ce402b4424f19a33c5ffe457d67ba35d174795f670257d124a9d0133d22107f1e287bc6635f8944bfdd5407b7477e436a9d68d7cf47

    • SSDEEP

      6144:VTfq8aL+jyORFsyRw5nVgOrkTxPcv/BnAtTHIw2hPVd+t3kfWeIDvxH5wCK/VVRA:Vi83ayaHkTOHETHz2fm8RIjxZU/VVRXw

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks