General
-
Target
a89fad70b3796aff6f7b90329019af6b
-
Size
1.1MB
-
Sample
231227-h7zv7sdfd2
-
MD5
a89fad70b3796aff6f7b90329019af6b
-
SHA1
c548c5eedd856be0efd30499ae584135f4aa7d0b
-
SHA256
e8c92171fa8555a035cfc6bdfae640175774c051eef460bf6af258fe6193e0af
-
SHA512
ab22a7e870c9bbfe804a15e37acc320381ff44a6d8e322485a48e64fba79797c475e27dd63e1de5dcd745dccff02bfa224f30ba9d98a82ef5d43a3b5b3a55292
-
SSDEEP
12288:ll5gFc7L2h2N0QZwFwItp01D7ien9gR3PcY/Keu/8BGiapVcKaRRURnLEcGbv3so:lkjUfMXcDsBRj5tF
Static task
static1
Behavioral task
behavioral1
Sample
a89fad70b3796aff6f7b90329019af6b.exe
Resource
win7-20231215-en
Malware Config
Extracted
cybergate
v1.07.5
fud
mcmisto.no-ip.info:443
5YL228UFB580A5
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
.//public_html/logs/
-
ftp_interval
60
-
injected_process
winlogon.exe
-
install_dir
drivers
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
s0g00d
Targets
-
-
Target
a89fad70b3796aff6f7b90329019af6b
-
Size
1.1MB
-
MD5
a89fad70b3796aff6f7b90329019af6b
-
SHA1
c548c5eedd856be0efd30499ae584135f4aa7d0b
-
SHA256
e8c92171fa8555a035cfc6bdfae640175774c051eef460bf6af258fe6193e0af
-
SHA512
ab22a7e870c9bbfe804a15e37acc320381ff44a6d8e322485a48e64fba79797c475e27dd63e1de5dcd745dccff02bfa224f30ba9d98a82ef5d43a3b5b3a55292
-
SSDEEP
12288:ll5gFc7L2h2N0QZwFwItp01D7ien9gR3PcY/Keu/8BGiapVcKaRRURnLEcGbv3so:lkjUfMXcDsBRj5tF
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-