General
-
Target
aed64c34244be891b9aa633d828cf16c31853c9c3d3b0700193b66270472fc13
-
Size
596KB
-
Sample
221029-q9mmnahgg8
-
MD5
dd1e572c027079a69742bb16dcc19920
-
SHA1
95a3967c0763706fbf7d0062db5301b6c344ccee
-
SHA256
aed64c34244be891b9aa633d828cf16c31853c9c3d3b0700193b66270472fc13
-
SHA512
dc95c63a1af2a971d63a77cf75b3a583cde47410c4f193357a193c070503f06e01215100a73e387895625023a6d7bfa4236e5b66442ba44573b23c1091236d18
-
SSDEEP
6144:a/sp/ta0rzdsTtVMfEqFv0FiTCKuuUIA8Wm4I6ufaszAYo93t:pFtJwVoWVxuX6m4E1EY8
Static task
static1
Behavioral task
behavioral1
Sample
aed64c34244be891b9aa633d828cf16c31853c9c3d3b0700193b66270472fc13.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
v1.02.0
remote
adrian15.ddns.net:81
adrian15.ddns.net:82
1V0S4DE0G724I0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
niƱamovil.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
pinomontano200000
-
regkey_hkcu
HKCU
Targets
-
-
Target
aed64c34244be891b9aa633d828cf16c31853c9c3d3b0700193b66270472fc13
-
Size
596KB
-
MD5
dd1e572c027079a69742bb16dcc19920
-
SHA1
95a3967c0763706fbf7d0062db5301b6c344ccee
-
SHA256
aed64c34244be891b9aa633d828cf16c31853c9c3d3b0700193b66270472fc13
-
SHA512
dc95c63a1af2a971d63a77cf75b3a583cde47410c4f193357a193c070503f06e01215100a73e387895625023a6d7bfa4236e5b66442ba44573b23c1091236d18
-
SSDEEP
6144:a/sp/ta0rzdsTtVMfEqFv0FiTCKuuUIA8Wm4I6ufaszAYo93t:pFtJwVoWVxuX6m4E1EY8
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-