General
-
Target
6a7b717681603aefd71977bfc07a2318dba49060056dd5d942030901b97a8f4a
-
Size
464KB
-
Sample
221123-l12yrsgb71
-
MD5
08703f67ad5222bf1c0f17308584d3dd
-
SHA1
e3c9ddf7a8d117746ee50d2cc0c9072c9a15915e
-
SHA256
6a7b717681603aefd71977bfc07a2318dba49060056dd5d942030901b97a8f4a
-
SHA512
edb494cd9d624d071b2e6fbb5ca28a1f664828e8dc5e552f4b8274868f7ccae55abb331672b07a84f235de41559c1abf55b5ad79362ff958a84cd705f050b1d1
-
SSDEEP
6144:iKuhfgZhLhfgZhQw1E7vd++mJ6kWwymy8jGtSsc3rRct2ffJojmo9wqcnhfgZh:iKwu7F+t6P/hk2c3rRmqbIc
Static task
static1
Behavioral task
behavioral1
Sample
6a7b717681603aefd71977bfc07a2318dba49060056dd5d942030901b97a8f4a.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
v1.04.8
remote
merosh.zapto.org:200
merosh.zapto.org:81
merosh.zapto.org:288
N6X0W8843KF3I0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Targets
-
-
Target
6a7b717681603aefd71977bfc07a2318dba49060056dd5d942030901b97a8f4a
-
Size
464KB
-
MD5
08703f67ad5222bf1c0f17308584d3dd
-
SHA1
e3c9ddf7a8d117746ee50d2cc0c9072c9a15915e
-
SHA256
6a7b717681603aefd71977bfc07a2318dba49060056dd5d942030901b97a8f4a
-
SHA512
edb494cd9d624d071b2e6fbb5ca28a1f664828e8dc5e552f4b8274868f7ccae55abb331672b07a84f235de41559c1abf55b5ad79362ff958a84cd705f050b1d1
-
SSDEEP
6144:iKuhfgZhLhfgZhQw1E7vd++mJ6kWwymy8jGtSsc3rRct2ffJojmo9wqcnhfgZh:iKwu7F+t6P/hk2c3rRmqbIc
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-