General
-
Target
214d877387cf79e0b0684f9b38a33d3ef8f149e3dd54da6057e6653b3f329d90
-
Size
282KB
-
Sample
221012-r8qhlagbhr
-
MD5
7b00d6eed244043c58d7627b9f93c35b
-
SHA1
2a531f73a60e931dd30ec0fd389445d2a2499db4
-
SHA256
214d877387cf79e0b0684f9b38a33d3ef8f149e3dd54da6057e6653b3f329d90
-
SHA512
71a5f4a178520f23c78e0176edff33bc1b0a7c091e6083d337a14614959d265cc64b47d7ecc3049a885f74a90abc9aa67597d7559c6510a15500b6574e942caf
-
SSDEEP
6144:+k4qmity5KeyIIxmAkU3h6R0WahOw2QHbTQ2gALG:h9syIUkjnaow2kbcd
Behavioral task
behavioral1
Sample
214d877387cf79e0b0684f9b38a33d3ef8f149e3dd54da6057e6653b3f329d90.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
majedbinnaser.no-ip.biz:288
majedbinnaser.no-ip.biz:81
majedbinnaser.no-ip.biz:3460
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
windows
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
erorr
-
message_box_title
erorr
-
password
abcd1234
Targets
-
-
Target
214d877387cf79e0b0684f9b38a33d3ef8f149e3dd54da6057e6653b3f329d90
-
Size
282KB
-
MD5
7b00d6eed244043c58d7627b9f93c35b
-
SHA1
2a531f73a60e931dd30ec0fd389445d2a2499db4
-
SHA256
214d877387cf79e0b0684f9b38a33d3ef8f149e3dd54da6057e6653b3f329d90
-
SHA512
71a5f4a178520f23c78e0176edff33bc1b0a7c091e6083d337a14614959d265cc64b47d7ecc3049a885f74a90abc9aa67597d7559c6510a15500b6574e942caf
-
SSDEEP
6144:+k4qmity5KeyIIxmAkU3h6R0WahOw2QHbTQ2gALG:h9syIUkjnaow2kbcd
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-