General
-
Target
13384f7179292b455c2d786ff594992d
-
Size
399KB
-
Sample
231230-j66g2aheem
-
MD5
13384f7179292b455c2d786ff594992d
-
SHA1
bb04f75828cb110ad4acd5faeffa925e298be607
-
SHA256
6d46885121a426d22e3b7e06b5771dfc9b5b560593826379791f1129e3f28a1d
-
SHA512
dc61f1b8e0126e06462d794d8fcd03167fd1bf148053095b7daa2e3b89ed6cb25c3ab459e985b066f274aec8bf71512e62baebfe8f9966c00b641d80bc8e37be
-
SSDEEP
6144:X/RI/NigX+SZ1/9UN2FzNeJifYXEU4qh8WD/cPn5Ti5Rb0ktnF8gESj8CvYSGxvx:vRI//qg2iZU4qiWbcP5mbRnnEUKPoD+
Static task
static1
Behavioral task
behavioral1
Sample
13384f7179292b455c2d786ff594992d.exe
Resource
win7-20231215-en
Malware Config
Extracted
cybergate
2.6
Aissa
82.242.250.193:81
82.242.250.193:82
82.242.250.193:83
54D10ZT5Z5Q0GR2Z20T05ZS
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Java
-
install_file
JavaUdapter.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
Targets
-
-
Target
13384f7179292b455c2d786ff594992d
-
Size
399KB
-
MD5
13384f7179292b455c2d786ff594992d
-
SHA1
bb04f75828cb110ad4acd5faeffa925e298be607
-
SHA256
6d46885121a426d22e3b7e06b5771dfc9b5b560593826379791f1129e3f28a1d
-
SHA512
dc61f1b8e0126e06462d794d8fcd03167fd1bf148053095b7daa2e3b89ed6cb25c3ab459e985b066f274aec8bf71512e62baebfe8f9966c00b641d80bc8e37be
-
SSDEEP
6144:X/RI/NigX+SZ1/9UN2FzNeJifYXEU4qh8WD/cPn5Ti5Rb0ktnF8gESj8CvYSGxvx:vRI//qg2iZU4qiWbcP5mbRnnEUKPoD+
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-