General

  • Target

    d1dcf22f1fdc353e5e37f34f91c8c7bc452eed7cc34f5d38c0e9cb4ccf96c107

  • Size

    848KB

  • Sample

    221204-ql4ahacd94

  • MD5

    c2d79d31b1b61acc12b50962719d2c81

  • SHA1

    9147ffdac44dd3b13612d796ddd0a8f6501fa43b

  • SHA256

    d1dcf22f1fdc353e5e37f34f91c8c7bc452eed7cc34f5d38c0e9cb4ccf96c107

  • SHA512

    ec6333fe7341f928a0c9b1d63df9442dfc4bea199ce37691d2e5ec8660032acb35125677f12d92f5dfd6dc7478fe7a235d79f55fe474946874765a974b63cf85

  • SSDEEP

    12288:hUGTlOuqNl6IGJVRJgSE6a3t6menhtgokCsMTBd47GLRMTbD:uGTul6IG3RJURtCXgoRDd474mfD

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Steam

C2

cybergatealin.no-ip.info:3074

Mutex

4XEROQN30C51H0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    Windows

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    STOP: 0x0000007B INACCESSIBLE_BOOT_DEVICE

  • message_box_title

    Error!

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      d1dcf22f1fdc353e5e37f34f91c8c7bc452eed7cc34f5d38c0e9cb4ccf96c107

    • Size

      848KB

    • MD5

      c2d79d31b1b61acc12b50962719d2c81

    • SHA1

      9147ffdac44dd3b13612d796ddd0a8f6501fa43b

    • SHA256

      d1dcf22f1fdc353e5e37f34f91c8c7bc452eed7cc34f5d38c0e9cb4ccf96c107

    • SHA512

      ec6333fe7341f928a0c9b1d63df9442dfc4bea199ce37691d2e5ec8660032acb35125677f12d92f5dfd6dc7478fe7a235d79f55fe474946874765a974b63cf85

    • SSDEEP

      12288:hUGTlOuqNl6IGJVRJgSE6a3t6menhtgokCsMTBd47GLRMTbD:uGTul6IG3RJURtCXgoRDd474mfD

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks