General
-
Target
28d0f0c637b33ca480c055fc035e600660bedd0c8504ac8889e3d040682fe07f
-
Size
412KB
-
Sample
221019-qfth4shgbk
-
MD5
a168adfda6b1d8c177cfd64935307c90
-
SHA1
b0e445cf99865be91b7e06e4318dc93ea8273006
-
SHA256
28d0f0c637b33ca480c055fc035e600660bedd0c8504ac8889e3d040682fe07f
-
SHA512
e8ea8df9ca5463ebd20c038cb9a41361bfb8cd89dfb86eb7829531297dec22584f90cf1dcbed2ac17d06815d2df61115d1dcf27de6f3bd7e45a4720e4c1f1629
-
SSDEEP
12288:tpbMsENIxDY8IdxXu3yjJnCBPho9fW5DE:tF0DXu35CW5DE
Static task
static1
Behavioral task
behavioral1
Sample
28d0f0c637b33ca480c055fc035e600660bedd0c8504ac8889e3d040682fe07f.exe
Resource
win7-20220901-en
Malware Config
Extracted
cybergate
2.6
02062010
jackbush.no-ip.biz:81
AdobeAcrobat7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./log_rat/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
MSOffice
-
install_file
update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
smalllulu
-
regkey_hkcu
AdobeAcrobat6
-
regkey_hklm
AdobeAcrobat5
Targets
-
-
Target
28d0f0c637b33ca480c055fc035e600660bedd0c8504ac8889e3d040682fe07f
-
Size
412KB
-
MD5
a168adfda6b1d8c177cfd64935307c90
-
SHA1
b0e445cf99865be91b7e06e4318dc93ea8273006
-
SHA256
28d0f0c637b33ca480c055fc035e600660bedd0c8504ac8889e3d040682fe07f
-
SHA512
e8ea8df9ca5463ebd20c038cb9a41361bfb8cd89dfb86eb7829531297dec22584f90cf1dcbed2ac17d06815d2df61115d1dcf27de6f3bd7e45a4720e4c1f1629
-
SSDEEP
12288:tpbMsENIxDY8IdxXu3yjJnCBPho9fW5DE:tF0DXu35CW5DE
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-