General

  • Target

    0b5a21e7ebc16eb4bb644d0acc4ee6571aa092c42274daaf07fb5a78ee35fb36

  • Size

    364KB

  • Sample

    221128-sgx9sscc79

  • MD5

    142f0715f64481ec999f90d627ac2add

  • SHA1

    30c1769470048eaf7173401eceb94e91235ec9c3

  • SHA256

    0b5a21e7ebc16eb4bb644d0acc4ee6571aa092c42274daaf07fb5a78ee35fb36

  • SHA512

    1b1d7f85cc1d9711e2f44d814e9cb14671a07a78c330efeb2bd5def51679d4eb2d49b9d347e8090345e0c8e74a5121d63f50a31b36af78108e62d0659e7e0345

  • SSDEEP

    6144:RoGb24ivR1+EXa0LPlDM32nIm5jPz+GLkWOMH:GRRnXa0jlI8V53+AOMH

Malware Config

Extracted

Family

cybergate

Version

v3.5.1.0

Botnet

remote

C2

takutaku1.no-ip.biz:1602

Mutex

TV7BU2TS1T2QE3

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

Targets

    • Target

      0b5a21e7ebc16eb4bb644d0acc4ee6571aa092c42274daaf07fb5a78ee35fb36

    • Size

      364KB

    • MD5

      142f0715f64481ec999f90d627ac2add

    • SHA1

      30c1769470048eaf7173401eceb94e91235ec9c3

    • SHA256

      0b5a21e7ebc16eb4bb644d0acc4ee6571aa092c42274daaf07fb5a78ee35fb36

    • SHA512

      1b1d7f85cc1d9711e2f44d814e9cb14671a07a78c330efeb2bd5def51679d4eb2d49b9d347e8090345e0c8e74a5121d63f50a31b36af78108e62d0659e7e0345

    • SSDEEP

      6144:RoGb24ivR1+EXa0LPlDM32nIm5jPz+GLkWOMH:GRRnXa0jlI8V53+AOMH

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks