General
-
Target
161a7c4ffa6106e220cfefe9c10b3b72
-
Size
404KB
-
Sample
231224-2hmdcsebdq
-
MD5
161a7c4ffa6106e220cfefe9c10b3b72
-
SHA1
12b72211dd6dee06b95121ed7af76e99864432bd
-
SHA256
35a01085fdb1a4e5ebc031487575a213c917d037013ad93292b71b9de9821c61
-
SHA512
d03539169d21634f68be177fe4cc69c295fc1b7c0107fdb8fa1a6098c4117b4e5ccf744e2278c1b3bc109b956bf3a987e0792b8a5b8cbacdf30050375c794e04
-
SSDEEP
12288:lKmuY3v9CN+JDUrKPdDCRM11GrIJPge4ag:lKnY3vkNkUr4d2RHkpgeS
Static task
static1
Behavioral task
behavioral1
Sample
161a7c4ffa6106e220cfefe9c10b3b72.exe
Resource
win7-20231215-en
Malware Config
Extracted
cybergate
v1.07.5
remote
127.0.0.1:100
JX517J2VY0M62Q
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
180125
Targets
-
-
Target
161a7c4ffa6106e220cfefe9c10b3b72
-
Size
404KB
-
MD5
161a7c4ffa6106e220cfefe9c10b3b72
-
SHA1
12b72211dd6dee06b95121ed7af76e99864432bd
-
SHA256
35a01085fdb1a4e5ebc031487575a213c917d037013ad93292b71b9de9821c61
-
SHA512
d03539169d21634f68be177fe4cc69c295fc1b7c0107fdb8fa1a6098c4117b4e5ccf744e2278c1b3bc109b956bf3a987e0792b8a5b8cbacdf30050375c794e04
-
SSDEEP
12288:lKmuY3v9CN+JDUrKPdDCRM11GrIJPge4ag:lKnY3vkNkUr4d2RHkpgeS
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-