General
-
Target
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d
-
Size
1.1MB
-
Sample
221128-rpjkyaab94
-
MD5
efd0cb9e9e31c798eb5a3da36ba6b93b
-
SHA1
d9fd375908375753192918469edaa4a0e9b24ce6
-
SHA256
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d
-
SHA512
23df02cc3ca3d601c51467796d10ccecc7bb80ae152dacb0b439e6a95d0149bb5c3f824b20149c1efcc7f8194213f5a71b06a3b1453821fb3562c9e2d3c048af
-
SSDEEP
24576:dnLooh+Op/CyXEQhDbFVuxTrnfpVOVFB4upovJqzuxTY:hLoohHp/ClSbFERfpVaIbS
Static task
static1
Behavioral task
behavioral1
Sample
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
cybergate
v1.23.0
tadeupratique
demolidor22.no-ip.org:7045
CG5C2H7NR20PY3
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
zzpratique
Targets
-
-
Target
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d
-
Size
1.1MB
-
MD5
efd0cb9e9e31c798eb5a3da36ba6b93b
-
SHA1
d9fd375908375753192918469edaa4a0e9b24ce6
-
SHA256
4e607404e9e8134c2ab85929154bd12972001fff086967930d5170d0de4f612d
-
SHA512
23df02cc3ca3d601c51467796d10ccecc7bb80ae152dacb0b439e6a95d0149bb5c3f824b20149c1efcc7f8194213f5a71b06a3b1453821fb3562c9e2d3c048af
-
SSDEEP
24576:dnLooh+Op/CyXEQhDbFVuxTrnfpVOVFB4upovJqzuxTY:hLoohHp/ClSbFERfpVaIbS
-
AmmyyAdmin payload
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-