General

  • Target

    842313aedbc2fb9ae9aaa1e41d9e32c11ab2a3196eec3c188d52c382becc29d9

  • Size

    695KB

  • Sample

    221130-jzbdbabh87

  • MD5

    62b260e46ec032956277c2e830d4e2f5

  • SHA1

    3c40a0a54422a7a9beb146b786ce3f3f5c32e4fc

  • SHA256

    842313aedbc2fb9ae9aaa1e41d9e32c11ab2a3196eec3c188d52c382becc29d9

  • SHA512

    2d75e8d1da5bee0f45f410e2e9d5b09423f5d47ca30f824e8969848f02d0dd3d3a8d0181fb0c7fab89f8e3d3c3fdc33b68059b85f9a5ae98f0a980ac77e6823d

  • SSDEEP

    12288:OWzjD9iow5EfeeVqJ1ZUmoxQak98yNW7Pj7oHtqyYLBAMqw+mVNeaziNY69/Xjgg:bzjD9iDDZUmSW8MWfHrLtqw+UNeeZ6J1

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

remote

C2

rockstarrr.no-ip.org:3014

Mutex

1GL2I4EXWXL2H7

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    svchost.exe

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    hundekuchen

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      842313aedbc2fb9ae9aaa1e41d9e32c11ab2a3196eec3c188d52c382becc29d9

    • Size

      695KB

    • MD5

      62b260e46ec032956277c2e830d4e2f5

    • SHA1

      3c40a0a54422a7a9beb146b786ce3f3f5c32e4fc

    • SHA256

      842313aedbc2fb9ae9aaa1e41d9e32c11ab2a3196eec3c188d52c382becc29d9

    • SHA512

      2d75e8d1da5bee0f45f410e2e9d5b09423f5d47ca30f824e8969848f02d0dd3d3a8d0181fb0c7fab89f8e3d3c3fdc33b68059b85f9a5ae98f0a980ac77e6823d

    • SSDEEP

      12288:OWzjD9iow5EfeeVqJ1ZUmoxQak98yNW7Pj7oHtqyYLBAMqw+mVNeaziNY69/Xjgg:bzjD9iDDZUmSW8MWfHrLtqw+UNeeZ6J1

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks