General
-
Target
edc4dd968041a7f3289bedca60db4c57fe755da81a24272c6ebbb2a7da86be2a
-
Size
284KB
-
Sample
221020-slg4dabbh3
-
MD5
903fc6ce995f7c7518aa79c1218e5776
-
SHA1
cc935521b77a245bde6abb015c130b8efd40d43c
-
SHA256
edc4dd968041a7f3289bedca60db4c57fe755da81a24272c6ebbb2a7da86be2a
-
SHA512
a5504a02b673df220d45e2a373d02a7a3c8d1cc50414a51b871f458d01ffe44bc08df7da8645f1ed8bef354b6c248ab9ebe762d40731255be07ca784c1550e5d
-
SSDEEP
6144:Kk4qmgpaHOFvXI0J11gWjJTO48r21ETJ3D2lh33HgK+3:V93ACXIY3TpJ1ETFghngH
Behavioral task
behavioral1
Sample
edc4dd968041a7f3289bedca60db4c57fe755da81a24272c6ebbb2a7da86be2a.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
azo0oz20100.zapto.org:2000
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Targets
-
-
Target
edc4dd968041a7f3289bedca60db4c57fe755da81a24272c6ebbb2a7da86be2a
-
Size
284KB
-
MD5
903fc6ce995f7c7518aa79c1218e5776
-
SHA1
cc935521b77a245bde6abb015c130b8efd40d43c
-
SHA256
edc4dd968041a7f3289bedca60db4c57fe755da81a24272c6ebbb2a7da86be2a
-
SHA512
a5504a02b673df220d45e2a373d02a7a3c8d1cc50414a51b871f458d01ffe44bc08df7da8645f1ed8bef354b6c248ab9ebe762d40731255be07ca784c1550e5d
-
SSDEEP
6144:Kk4qmgpaHOFvXI0J11gWjJTO48r21ETJ3D2lh33HgK+3:V93ACXIY3TpJ1ETFghngH
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops file in System32 directory
-