Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 17:20

General

  • Target

    cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe

  • Size

    656KB

  • MD5

    de1c223fd850968507195255982efee3

  • SHA1

    bf8b7083cc8343310d7600d7f48831d252ab8484

  • SHA256

    cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851

  • SHA512

    8efa6e07672ad8aaa7b730da5455896f40f89b032fb104ff872a31ae2b67a7dc67d089f3db543a49308ccf3bbb7a2ef5a9e43576d88ee569d17e0437a1a4f5be

  • SSDEEP

    12288:vep8gmYrC7upQwG6nxMqQ7zDOPc3mJ4J8E0Sk5WAn0/iYjzZUb9mDE8k:mpmK4jKnKqAq48zSkMAn0fmIDk

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

1

C2

127.0.0.1:81

looost.no-ip.biz:82

jarjeer.no-ip.biz:288

Mutex

***dll***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    dll

  • install_file

    dll.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    a7mdrat

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe
    "C:\Users\Admin\AppData\Local\Temp\cf8224172d3e69621810e0e20de8544b773c574c5327106831289f8e42b6a851.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:1148

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1776-54-0x0000000074C91000-0x0000000074C93000-memory.dmp
      Filesize

      8KB

    • memory/1776-55-0x00000000002E0000-0x000000000032E000-memory.dmp
      Filesize

      312KB

    • memory/1776-56-0x0000000000531000-0x0000000000535000-memory.dmp
      Filesize

      16KB

    • memory/1776-57-0x00000000020B0000-0x00000000021B0000-memory.dmp
      Filesize

      1024KB

    • memory/1776-58-0x00000000003A1000-0x00000000003A5000-memory.dmp
      Filesize

      16KB

    • memory/1776-59-0x0000000000400000-0x00000000004B6000-memory.dmp
      Filesize

      728KB

    • memory/1776-61-0x0000000010410000-0x000000001046C000-memory.dmp
      Filesize

      368KB

    • memory/1776-67-0x00000000002E0000-0x000000000032E000-memory.dmp
      Filesize

      312KB

    • memory/1776-68-0x0000000000400000-0x00000000004B6000-memory.dmp
      Filesize

      728KB