General
-
Target
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0
-
Size
2.0MB
-
Sample
221203-wr668sge6v
-
MD5
273cf918dd3d8096545e7907364ea204
-
SHA1
b39f8374a7d0165dae5d5c5cbe6a09bc9f4a83ed
-
SHA256
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0
-
SHA512
e83aefc7e3c1ee27d26e11203f0d1816c9d43825b1442af008b722819bf12f0b7e75d506a3dcd61feddfc78ee87892f56f15a9c7ab0459473dd5fafbfaad7764
-
SSDEEP
49152:y3Ha/yeOxpsv3TVNixlG676QUYLKW22OVOJvmOeW3k9R:ya/yeOxpsvpNixf/X22OUvmOPA
Behavioral task
behavioral1
Sample
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
cybergate
2.6
J600
j600.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Temps
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hklm
Windows live messenger
Targets
-
-
Target
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0
-
Size
2.0MB
-
MD5
273cf918dd3d8096545e7907364ea204
-
SHA1
b39f8374a7d0165dae5d5c5cbe6a09bc9f4a83ed
-
SHA256
2ba6414a3cca988c13c5ad92ece786b43fccb6a77de3625dab20c5a397ce08a0
-
SHA512
e83aefc7e3c1ee27d26e11203f0d1816c9d43825b1442af008b722819bf12f0b7e75d506a3dcd61feddfc78ee87892f56f15a9c7ab0459473dd5fafbfaad7764
-
SSDEEP
49152:y3Ha/yeOxpsv3TVNixlG676QUYLKW22OVOJvmOeW3k9R:ya/yeOxpsvpNixf/X22OUvmOPA
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-