General

  • Target

    99d019466ae30c3672c0e2795614ca7943b8c7b79764283411c733a69290dadb

  • Size

    472KB

  • Sample

    221204-qmfwlagb4w

  • MD5

    a466cf747bbc9497ea7ca369704cb3e9

  • SHA1

    c84997b24a0428e08d87b34f90bb4aada52628a0

  • SHA256

    99d019466ae30c3672c0e2795614ca7943b8c7b79764283411c733a69290dadb

  • SHA512

    7ffb205ef60bf1ef1a3b0de8187e0c3f4e47602aafb93547b1f74093dd2d6d47942da8f7a36d005ec50e97757ed5c3260bba65d1d3c0b955ae9b3b9361624d1b

  • SSDEEP

    12288:MvvhjR5tUV9EAMxGzG9fjijs95FtwVwluFnxW80Zru:MvvdR5OEAMV9HFt1uFxW80E

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

nanoxa.no-ip.org:80

nanoxa.no-ip.org:81

nanoxa.no-ip.org:2000

Mutex

jajajajaa

Attributes
  • enable_keylogger

    false

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Hacked by Nanoxa

  • message_box_title

    Error

  • password

    abcd1234

Targets

    • Target

      99d019466ae30c3672c0e2795614ca7943b8c7b79764283411c733a69290dadb

    • Size

      472KB

    • MD5

      a466cf747bbc9497ea7ca369704cb3e9

    • SHA1

      c84997b24a0428e08d87b34f90bb4aada52628a0

    • SHA256

      99d019466ae30c3672c0e2795614ca7943b8c7b79764283411c733a69290dadb

    • SHA512

      7ffb205ef60bf1ef1a3b0de8187e0c3f4e47602aafb93547b1f74093dd2d6d47942da8f7a36d005ec50e97757ed5c3260bba65d1d3c0b955ae9b3b9361624d1b

    • SSDEEP

      12288:MvvhjR5tUV9EAMxGzG9fjijs95FtwVwluFnxW80Zru:MvvdR5OEAMV9HFt1uFxW80E

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks