General
-
Target
2a83432cb29fb7dc1da346544971e420
-
Size
620KB
-
Sample
231225-s8prqsaehk
-
MD5
2a83432cb29fb7dc1da346544971e420
-
SHA1
a4b4b03d20eef8a01659b5dd6aa5f58c6fa741e0
-
SHA256
dd76ec6f7d5c5c4b5530d1d83819d0976ca4d4538b0a543180c4b74f8da9db89
-
SHA512
a5ed0b9bfc522b5c6ce83d06c5ac3dd960b7a6b9ee88e06b981132dd1eb95879ea6c382fcc3e73973567e27b20e2be3ec79e3ed071a57188c51db765cdb6bfaa
-
SSDEEP
12288:AWOD3Y3R1whbHY+Dgd9VvlNU4rtH5IYWszq6LHMP:AnbDg5XU4rBnWs3Q
Static task
static1
Behavioral task
behavioral1
Sample
2a83432cb29fb7dc1da346544971e420.exe
Resource
win7-20231129-en
Malware Config
Extracted
cybergate
v1.07.5
SlysBitch
sly.fcuked.me.uk:2020
Y0BB06QWE8BSVP
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
ma1lc0
Targets
-
-
Target
2a83432cb29fb7dc1da346544971e420
-
Size
620KB
-
MD5
2a83432cb29fb7dc1da346544971e420
-
SHA1
a4b4b03d20eef8a01659b5dd6aa5f58c6fa741e0
-
SHA256
dd76ec6f7d5c5c4b5530d1d83819d0976ca4d4538b0a543180c4b74f8da9db89
-
SHA512
a5ed0b9bfc522b5c6ce83d06c5ac3dd960b7a6b9ee88e06b981132dd1eb95879ea6c382fcc3e73973567e27b20e2be3ec79e3ed071a57188c51db765cdb6bfaa
-
SSDEEP
12288:AWOD3Y3R1whbHY+Dgd9VvlNU4rtH5IYWszq6LHMP:AnbDg5XU4rBnWs3Q
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-