General
-
Target
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3
-
Size
295KB
-
Sample
221123-vv6jfada61
-
MD5
369cfd39f18801884419694bc7a252ca
-
SHA1
c3566e3052c32a3d6f4e4f7f65529992961593a6
-
SHA256
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3
-
SHA512
988a87ce6cc569af62a50007e22ae602954db1e0ef63c0eb66722dae6afc60df9271ced0967ff7a04ee2a0dc3cb97cde98f34520745cee4c55b46c57e8df9b31
-
SSDEEP
6144:Bk4qmBNFJqJxxy05Q33rVSIHnMoRJY2OTSKMuhbqLrMo7z+eleEb:W9oAxxrE30TSh2ar9P
Behavioral task
behavioral1
Sample
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
cybergate
2.6
ÌÏíÏ ÇáãæÈßÓ
127.0.0.1:288
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3
-
Size
295KB
-
MD5
369cfd39f18801884419694bc7a252ca
-
SHA1
c3566e3052c32a3d6f4e4f7f65529992961593a6
-
SHA256
326eb9ccd07aa6d1d9b46ffee4cd1cff6de47a20e3c8bfb447ae9ef5b18b80f3
-
SHA512
988a87ce6cc569af62a50007e22ae602954db1e0ef63c0eb66722dae6afc60df9271ced0967ff7a04ee2a0dc3cb97cde98f34520745cee4c55b46c57e8df9b31
-
SSDEEP
6144:Bk4qmBNFJqJxxy05Q33rVSIHnMoRJY2OTSKMuhbqLrMo7z+eleEb:W9oAxxrE30TSh2ar9P
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-