General

  • Target

    fe5c14753c1d5b8bc2a94852560e261728243a22b83198125a2df40a95d7954d

  • Size

    557KB

  • Sample

    221127-jsegdsbb36

  • MD5

    bb7b41c38ad9fbd85eb0323824a7f173

  • SHA1

    ceae3c8aaea19ebbbabfc06f5bb0be5f46e26a62

  • SHA256

    fe5c14753c1d5b8bc2a94852560e261728243a22b83198125a2df40a95d7954d

  • SHA512

    b20b717a2e8ee0d7120a998c329888d5b66842de26077789a5bc77110062e3ab152b82b18beb6a1cc717ccddafd15b0ce55486fcac798240e5e4a87d366d9428

  • SSDEEP

    12288:VB1A8v5DBnKKek7RqFGY5+4FYvJY2GemeFx3FiRU5SHOWOrLIX:31A8v5DVKKVRqvs4Fb2vdswDWOrLIX

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

hack

C2

byehack.no-ip.org:1213

Mutex

O5B3J57T8A0OL2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1235

Targets

    • Target

      Logiciel.exe

    • Size

      898KB

    • MD5

      45bf9ee48da640b917ff46f33703f536

    • SHA1

      345ec16b5130fd1294cc7426023275e09ab8aea0

    • SHA256

      cbd7f4aac14369eeb672432552a68f30f9dd0ad4e96171ad31d00f23938838b1

    • SHA512

      eb8e4de02375f6cd51b07a9276eca969bcc9a258cc1ed5ec45834bd74bd8f4378666dd805b70b3fbe1741dd0f6509ce6f5420db914ef868d60c4bacd00968458

    • SSDEEP

      12288:dH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QlufQFbGdNHQ1Gs3l4mMWfgB:dbCj2sObHtqQ4QluIGdNQbl4mMWfgB

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

4
T1112

Discovery

System Information Discovery

1
T1082

Tasks