General
-
Target
45a1e05a7abfa9247f2a4a94cfdc1677090a1868ad2e1f94b85a2b7bb858d1f7
-
Size
490KB
-
Sample
221106-k1tfysdac7
-
MD5
11dff9b08cca0249d2622d17115264a8
-
SHA1
38bf62bda42503fbd245d41bf54f71cb6e23564f
-
SHA256
45a1e05a7abfa9247f2a4a94cfdc1677090a1868ad2e1f94b85a2b7bb858d1f7
-
SHA512
4fc289b378b1530d8b3634694cfb677a0fbe94a575b034e73909968ab0655df2f090ae6629ab17fac2d3a71ed11c0322a03d50c41ee78e5c0246e9cf13342956
-
SSDEEP
12288:arPzh5qyWoQ85D9UGCYpiItkF/ADhw2wAqLeziEC+:4xQCUxVtF/2w2Yk
Static task
static1
Behavioral task
behavioral1
Sample
45a1e05a7abfa9247f2a4a94cfdc1677090a1868ad2e1f94b85a2b7bb858d1f7.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
v3.4.2.2
remote
chahid123.no-ip.biz:81
MI632AI6QHV5N8
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
foto.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Targets
-
-
Target
45a1e05a7abfa9247f2a4a94cfdc1677090a1868ad2e1f94b85a2b7bb858d1f7
-
Size
490KB
-
MD5
11dff9b08cca0249d2622d17115264a8
-
SHA1
38bf62bda42503fbd245d41bf54f71cb6e23564f
-
SHA256
45a1e05a7abfa9247f2a4a94cfdc1677090a1868ad2e1f94b85a2b7bb858d1f7
-
SHA512
4fc289b378b1530d8b3634694cfb677a0fbe94a575b034e73909968ab0655df2f090ae6629ab17fac2d3a71ed11c0322a03d50c41ee78e5c0246e9cf13342956
-
SSDEEP
12288:arPzh5qyWoQ85D9UGCYpiItkF/ADhw2wAqLeziEC+:4xQCUxVtF/2w2Yk
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Suspicious use of SetThreadContext
-