General
-
Target
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b
-
Size
591KB
-
Sample
221030-wzkyzaeecr
-
MD5
81a95c0e6fe616d8308819f6e78fe954
-
SHA1
460b78f22b031ae1710171fe232f254dd2048f1c
-
SHA256
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b
-
SHA512
0e598d0638b48a9e79ff4fbdbbd1092056d87db6ee2829b1593045e6f217b15aff784446d8119923d7da52e7a6d7c656a73b3c178eba71d9b474a98da9ac42ad
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLE/ZYftCzogvCYoKYr:tthEVaPqLflCzrCYoKYr
Behavioral task
behavioral1
Sample
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
2.6
daff
boucraa.no-ip.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
Win_Xp.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Please try again later.
-
message_box_title
Error
-
password
abcd1234
Targets
-
-
Target
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b
-
Size
591KB
-
MD5
81a95c0e6fe616d8308819f6e78fe954
-
SHA1
460b78f22b031ae1710171fe232f254dd2048f1c
-
SHA256
56f2583edfe15a01c1f83269d1b0f9ec58d60e7f1b568c9b834de19aa3e8d35b
-
SHA512
0e598d0638b48a9e79ff4fbdbbd1092056d87db6ee2829b1593045e6f217b15aff784446d8119923d7da52e7a6d7c656a73b3c178eba71d9b474a98da9ac42ad
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLE/ZYftCzogvCYoKYr:tthEVaPqLflCzrCYoKYr
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-