General

  • Target

    d37befc983e4585d2c5779de018cc527f517f3b3c98919555d0365fe701e1a24

  • Size

    529KB

  • Sample

    221204-j7q4qsfd2y

  • MD5

    fb4d81ec0e4b961d1fed3c31d663a90a

  • SHA1

    a14307aef747edb356bdcaa643eea1e645342013

  • SHA256

    d37befc983e4585d2c5779de018cc527f517f3b3c98919555d0365fe701e1a24

  • SHA512

    08a08716cdc6fdea8f5844c61a44541dc8ac31900624414d0326e4a8599a8444612d242a3d5a824f23fca316665a157e01a32c4c58aedeb8e2f060e3d36b257c

  • SSDEEP

    12288:iws3BcN2emjotGtuy6H8eAtpVxagSCyVCbS0jYNFXifvS:iN3BWmoElNSCyVCe0jYLy

Malware Config

Extracted

Family

cybergate

Version

v1.02.7

Botnet

remote

C2

buenasondas.no-ip.biz:81

Mutex

16X65KS0A215BO

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    csrss.exe

  • install_dir

    MsnSettings

  • install_file

    Updates.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    dapimp

  • regkey_hkcu

    MsnPluss

  • regkey_hklm

    MsnPluss

Targets

    • Target

      d37befc983e4585d2c5779de018cc527f517f3b3c98919555d0365fe701e1a24

    • Size

      529KB

    • MD5

      fb4d81ec0e4b961d1fed3c31d663a90a

    • SHA1

      a14307aef747edb356bdcaa643eea1e645342013

    • SHA256

      d37befc983e4585d2c5779de018cc527f517f3b3c98919555d0365fe701e1a24

    • SHA512

      08a08716cdc6fdea8f5844c61a44541dc8ac31900624414d0326e4a8599a8444612d242a3d5a824f23fca316665a157e01a32c4c58aedeb8e2f060e3d36b257c

    • SSDEEP

      12288:iws3BcN2emjotGtuy6H8eAtpVxagSCyVCbS0jYNFXifvS:iN3BWmoElNSCyVCe0jYLy

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks