General

  • Target

    51e9406c720cf4e425459bc35760b8fc023b0bd1f23cef401e82d772d774d65d

  • Size

    640KB

  • Sample

    221029-sp8eqscbb6

  • MD5

    4e4bcba01f5fa1b6a0f46c2fbdac8159

  • SHA1

    b287e34aef612c7c26829fe4ce9af9270b0c80bc

  • SHA256

    51e9406c720cf4e425459bc35760b8fc023b0bd1f23cef401e82d772d774d65d

  • SHA512

    aa946606b639052942b46ffa66bccbd28d67ad78c4af6722e191a4afa2e4ae9f246bf81e87d0e1d95f2a3e7aaab9722cd246ca09a7ed4da535222679959e5e59

  • SSDEEP

    6144:YfQfMxoUpm4Ki0MroNZYZtKMdruis0wshAUWiArnVYkYn90H7Ip9tyTiX9McxRy1:YTWDfMrO0dwWa5Ss7Ip9lRy1k80C

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

usr

C2

dns1234.zapto.org:1604

Mutex

GK2L0Y13827YW0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    vlcpp

  • install_file

    vlcpp.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    2222

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      51e9406c720cf4e425459bc35760b8fc023b0bd1f23cef401e82d772d774d65d

    • Size

      640KB

    • MD5

      4e4bcba01f5fa1b6a0f46c2fbdac8159

    • SHA1

      b287e34aef612c7c26829fe4ce9af9270b0c80bc

    • SHA256

      51e9406c720cf4e425459bc35760b8fc023b0bd1f23cef401e82d772d774d65d

    • SHA512

      aa946606b639052942b46ffa66bccbd28d67ad78c4af6722e191a4afa2e4ae9f246bf81e87d0e1d95f2a3e7aaab9722cd246ca09a7ed4da535222679959e5e59

    • SSDEEP

      6144:YfQfMxoUpm4Ki0MroNZYZtKMdruis0wshAUWiArnVYkYn90H7Ip9tyTiX9McxRy1:YTWDfMrO0dwWa5Ss7Ip9lRy1k80C

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks