General

  • Target

    d7383940a97f48d87711af12e9cd8235aee0bb3c47c45a1eda54769f90413183

  • Size

    911KB

  • Sample

    221205-e1dslsag2w

  • MD5

    e1b3a178d35c9a1e503d879ca5066735

  • SHA1

    0871fcdc2e8d3fbf68e58eb2e2c248d5b4ef6182

  • SHA256

    d7383940a97f48d87711af12e9cd8235aee0bb3c47c45a1eda54769f90413183

  • SHA512

    765cf38ac2d645c8036664bd20c37bce7b1f9ef5fdfd5bef0c50dad18348e8b00d6e96ea835888a866c2c41f44ae3f066073547817b6f78155a4d97ef285cef5

  • SSDEEP

    12288:4VmCvkEiT0G921E6NF59LoQRIMLAmeNB7HbKuuqlYPY/78VMiRvo8hkdRjFnU7SE:4ze0G96D1lw/hBV/CU

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

NewCrypt

C2

mirozamp.no-ip.biz:6666

192.168.1.210:6666

Mutex

8ALCXF556UJS1P

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WindowsUpdate

  • install_file

    Update.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    An Error Accurred! System Error (0X00A34B33F).

  • message_box_title

    Error!

  • password

    mi11ro67

  • regkey_hkcu

    Microsoft

  • regkey_hklm

    Microsoft

Targets

    • Target

      d7383940a97f48d87711af12e9cd8235aee0bb3c47c45a1eda54769f90413183

    • Size

      911KB

    • MD5

      e1b3a178d35c9a1e503d879ca5066735

    • SHA1

      0871fcdc2e8d3fbf68e58eb2e2c248d5b4ef6182

    • SHA256

      d7383940a97f48d87711af12e9cd8235aee0bb3c47c45a1eda54769f90413183

    • SHA512

      765cf38ac2d645c8036664bd20c37bce7b1f9ef5fdfd5bef0c50dad18348e8b00d6e96ea835888a866c2c41f44ae3f066073547817b6f78155a4d97ef285cef5

    • SSDEEP

      12288:4VmCvkEiT0G921E6NF59LoQRIMLAmeNB7HbKuuqlYPY/78VMiRvo8hkdRjFnU7SE:4ze0G96D1lw/hBV/CU

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks