General
-
Target
b55369e56416909e713d9e9f07b95f4c53ab70462b0bd76fcde6023475f3bb43
-
Size
453KB
-
Sample
230129-lms4psbb9s
-
MD5
9a5a10726f0ef69028670e762dd26760
-
SHA1
02f1469d52ae80df7015061367a6c8b2fea41399
-
SHA256
b55369e56416909e713d9e9f07b95f4c53ab70462b0bd76fcde6023475f3bb43
-
SHA512
496a4d8f2465b7bb87d6778a0031940a695da718c22f751237c71a3659113983d35d5480a4d19edb909904643f24e8cb4a52f28cff9c07198d5e81abd1470907
-
SSDEEP
12288:s822HzuFbMsGD54BI7EsKgBwBkDXfGcbH677MGVkaSb1A:souFBGDF7EzB0TaU4
Static task
static1
Behavioral task
behavioral1
Sample
b55369e56416909e713d9e9f07b95f4c53ab70462b0bd76fcde6023475f3bb43.exe
Resource
win7-20221111-en
Malware Config
Extracted
cybergate
v1.07.5
PC
java-upload.sytes.net:1315
0UDHMXBLJ6T115
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
microsoft
-
install_file
java.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
0
-
regkey_hkcu
microsoft
-
regkey_hklm
microsoft
Targets
-
-
Target
b55369e56416909e713d9e9f07b95f4c53ab70462b0bd76fcde6023475f3bb43
-
Size
453KB
-
MD5
9a5a10726f0ef69028670e762dd26760
-
SHA1
02f1469d52ae80df7015061367a6c8b2fea41399
-
SHA256
b55369e56416909e713d9e9f07b95f4c53ab70462b0bd76fcde6023475f3bb43
-
SHA512
496a4d8f2465b7bb87d6778a0031940a695da718c22f751237c71a3659113983d35d5480a4d19edb909904643f24e8cb4a52f28cff9c07198d5e81abd1470907
-
SSDEEP
12288:s822HzuFbMsGD54BI7EsKgBwBkDXfGcbH677MGVkaSb1A:souFBGDF7EzB0TaU4
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-