General
-
Target
9ff8fa250390ae22fec69e4eba2dd62016ab252c72ff5f0ab33c31314b999bf1
-
Size
677KB
-
Sample
221126-tngfasff78
-
MD5
c4ce9e5f380252abd4bfa5ec2fb9175b
-
SHA1
01908253ac0e0c483da78ccb0c940ee77ea46d7b
-
SHA256
9ff8fa250390ae22fec69e4eba2dd62016ab252c72ff5f0ab33c31314b999bf1
-
SHA512
03cdfd3a157d7393e4c8e0d93defd26597cd67a65b036582eeb60911ba43db1bcc488e5980dcac061ec0712a7a940575ce6966f87fbcb0d9c605b38d503b23a9
-
SSDEEP
12288:rm6x6bLRwMrSgUjPEtjCuIqNK6ypnuDuZ+t0r:redwMrSPwp9PNKVuDaKc
Static task
static1
Behavioral task
behavioral1
Sample
9ff8fa250390ae22fec69e4eba2dd62016ab252c72ff5f0ab33c31314b999bf1.exe
Resource
win7-20221111-en
Malware Config
Extracted
cybergate
v1.02.0
hacker
154.no-ip.info:8000
YYC675271PULN4
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
.//
-
ftp_interval
30
-
ftp_password
army745volt019
-
ftp_port
21
-
ftp_server
ftp.primahostindo.info
-
ftp_username
admin@primahostindo.info
-
injected_process
explorer.exe
-
install_dir
drivers
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
army745volt019
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
9ff8fa250390ae22fec69e4eba2dd62016ab252c72ff5f0ab33c31314b999bf1
-
Size
677KB
-
MD5
c4ce9e5f380252abd4bfa5ec2fb9175b
-
SHA1
01908253ac0e0c483da78ccb0c940ee77ea46d7b
-
SHA256
9ff8fa250390ae22fec69e4eba2dd62016ab252c72ff5f0ab33c31314b999bf1
-
SHA512
03cdfd3a157d7393e4c8e0d93defd26597cd67a65b036582eeb60911ba43db1bcc488e5980dcac061ec0712a7a940575ce6966f87fbcb0d9c605b38d503b23a9
-
SSDEEP
12288:rm6x6bLRwMrSgUjPEtjCuIqNK6ypnuDuZ+t0r:redwMrSPwp9PNKVuDaKc
-
Adds policy Run key to start application
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-