General
-
Target
169900d60c47acc4f6f4aac616564968c678de207643bd855bea4ab6c4ac27b7
-
Size
423KB
-
Sample
221123-xpw4xsaf5x
-
MD5
35190c42541808ca6456c936376e6f7c
-
SHA1
d721cc793104633022937c08c22460d2210cfe67
-
SHA256
169900d60c47acc4f6f4aac616564968c678de207643bd855bea4ab6c4ac27b7
-
SHA512
a159180382b9bb5cc1ed7dea99f99d98a42ea190d28dac2acc31bf4136d138b238be3f9768018a83aa1632a9f91c8987972b85b0465a88eb8e6a154c20805fb6
-
SSDEEP
6144:ZmcD66RHTMXP7mv85JGmrpQsK3RD2u270jupCJsCxC3IN:8cD66BTMsZZ2zkPaCx
Behavioral task
behavioral1
Sample
169900d60c47acc4f6f4aac616564968c678de207643bd855bea4ab6c4ac27b7.exe
Resource
win7-20220812-en
Malware Config
Extracted
cybergate
2.6
infectado
190.246.195.236:81
jajatonto..
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Win32
-
install_file
notepad.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
caca32
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
169900d60c47acc4f6f4aac616564968c678de207643bd855bea4ab6c4ac27b7
-
Size
423KB
-
MD5
35190c42541808ca6456c936376e6f7c
-
SHA1
d721cc793104633022937c08c22460d2210cfe67
-
SHA256
169900d60c47acc4f6f4aac616564968c678de207643bd855bea4ab6c4ac27b7
-
SHA512
a159180382b9bb5cc1ed7dea99f99d98a42ea190d28dac2acc31bf4136d138b238be3f9768018a83aa1632a9f91c8987972b85b0465a88eb8e6a154c20805fb6
-
SSDEEP
6144:ZmcD66RHTMXP7mv85JGmrpQsK3RD2u270jupCJsCxC3IN:8cD66BTMsZZ2zkPaCx
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-