Analysis

  • max time kernel
    303s
  • max time network
    347s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 09:31

General

  • Target

    825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c.exe

  • Size

    454KB

  • MD5

    5b747bea00230414e196afd29ffd9cf7

  • SHA1

    a1bff5c84bdb5895f693e7239735f93c81629c77

  • SHA256

    825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c

  • SHA512

    18e004758d760a26641186dfd4ac8d140a131f59d77f29e02c0b9e120d64e1cca80e8d1f5675a92f44031fd6fc78de9648d9da14da8fd158fe15314ea8ba0bfa

  • SSDEEP

    6144:FEYZenDUvNOYa+qmbjqsPGp3OJbsGynZO3ehp6k7+4Kgkw2D+QBOBw1VIfQFS2wx:Xen4vMJMqmeHZEepuw2apORD8

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

q

C2

looost.no-ip.biz:90

Mutex

K0672GC34DW2QD

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    explorer

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c.exe
    "C:\Users\Admin\AppData\Local\Temp\825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:4572
      • C:\Users\Admin\AppData\Local\Temp\825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c.exe
        "C:\Users\Admin\AppData\Local\Temp\825f7b53d5ff21207e0d650a6e1d18c34f9a87f9839bd33ec4635ec312e9743c.exe"
        2⤵
          PID:3104

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2152-132-0x00000000020C0000-0x000000000210E000-memory.dmp
        Filesize

        312KB

      • memory/2152-133-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/2152-134-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/2152-135-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/2152-137-0x0000000010410000-0x0000000010482000-memory.dmp
        Filesize

        456KB

      • memory/2152-142-0x0000000010490000-0x0000000010502000-memory.dmp
        Filesize

        456KB

      • memory/3104-141-0x0000000000000000-mapping.dmp
      • memory/3104-145-0x0000000010490000-0x0000000010502000-memory.dmp
        Filesize

        456KB

      • memory/3104-146-0x0000000010490000-0x0000000010502000-memory.dmp
        Filesize

        456KB