General

  • Target

    3cf948a9d197b0c8f20bc0dc4d4e7a34f14025ed3db1ded4268bdba5d6f4c6c5

  • Size

    369KB

  • Sample

    221124-jspblaaa82

  • MD5

    b92ccb0680e944a29fd9885844a09ede

  • SHA1

    03bd0892cd2dac0584806d03e928806ca75c3b6e

  • SHA256

    3cf948a9d197b0c8f20bc0dc4d4e7a34f14025ed3db1ded4268bdba5d6f4c6c5

  • SHA512

    0496aee138686894ba9559c388c82474e85d54b2d285c8f8d99c622b295e1bdbcf62b93468bfb2d158cd59f041cf8cd574e656e477782aaa9eeb8af1fe31ffb6

  • SSDEEP

    6144:rC30iEhXsKZ4BkWXCw3tumaNiaG0CvsU1am5LHngHf3sQ67evKpxwhPjySM/heK:G30xp4O6CCSiaEZAIngHf3s77eixuPjc

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

BITCOIN

C2

bitcoin2014.no-ip.org:88

Mutex

WHBOPW0F2QU138

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Win32

  • install_file

    algr.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    peces

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      Inbox.exe

    • Size

      1.2MB

    • MD5

      917f017943acb84f9d09e328b9925ca2

    • SHA1

      32fc6917fea4947d554105c848bb84378d60df0e

    • SHA256

      cc2c4ea5a1d63d5d54f57b82cfaf7473a2b9e8a30a00490089d3133130b75df1

    • SHA512

      3e758ef222c21b688efded0446cc6098c219823b6121bd0f16ee3aa41a218fc639e5f495c6abf34b6b5d215a3262564abc34801d716bc69ac7a74e7a2a867286

    • SSDEEP

      6144:0LJJK2Ay5zdBV45NX1woIuDYDpdVbR4n6I:0v9v

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks