General
-
Target
727ebb01f9255f9b75da21cbfd724dd5523f66f7e6b75aea84e802b759648058
-
Size
671KB
-
Sample
221129-h2hpqsgb59
-
MD5
47a99a4cceb260f9350a4737b2c6251b
-
SHA1
03d377dc7861701c67c2b58d6ee52257be366b2b
-
SHA256
727ebb01f9255f9b75da21cbfd724dd5523f66f7e6b75aea84e802b759648058
-
SHA512
168cd57ebc834402552a0b484691a3bbe685b5791179b6620f8d7f745918f79fe59d085c9658ffba83d2db8f0958e03b7f2cc03260f350a00c0d871c3b429a33
-
SSDEEP
12288:wNW5ysNfbp+h55CC7XeZrf+8THVKjzOOx5Gr1ido5b5PvG3J3AQEzpJWMnIS:vyi1+h97mrf+vzOOx5m1io3XG6XWMnn
Static task
static1
Behavioral task
behavioral1
Sample
727ebb01f9255f9b75da21cbfd724dd5523f66f7e6b75aea84e802b759648058.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
cybergate
2.6
ÖÍíÉ
zgr-99.no-ip.org:7500
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
zagrti.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
727ebb01f9255f9b75da21cbfd724dd5523f66f7e6b75aea84e802b759648058
-
Size
671KB
-
MD5
47a99a4cceb260f9350a4737b2c6251b
-
SHA1
03d377dc7861701c67c2b58d6ee52257be366b2b
-
SHA256
727ebb01f9255f9b75da21cbfd724dd5523f66f7e6b75aea84e802b759648058
-
SHA512
168cd57ebc834402552a0b484691a3bbe685b5791179b6620f8d7f745918f79fe59d085c9658ffba83d2db8f0958e03b7f2cc03260f350a00c0d871c3b429a33
-
SSDEEP
12288:wNW5ysNfbp+h55CC7XeZrf+8THVKjzOOx5Gr1ido5b5PvG3J3AQEzpJWMnIS:vyi1+h97mrf+vzOOx5m1io3XG6XWMnn
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-