General
-
Target
0b789ac29a21f20d7607a222dba52439
-
Size
348KB
-
Sample
231230-vh7kzaafgk
-
MD5
0b789ac29a21f20d7607a222dba52439
-
SHA1
4f832f37c04db400b07be601ce62b4ba3178dafd
-
SHA256
b6460f61ef47bafb7236e175e141ec5292c87706a632d78b9ad754f966dc8d75
-
SHA512
1b7881ac182bc2c3f590f15e95ada700399bf715e323ae7d9b620134ad5d016caaf97b9369dbc0741a6be83be4fd1d3b16bae3ec7112eca95dd70a8e59693af1
-
SSDEEP
6144:ac/GNfg2APs5kFKEVtsX/tc580lhXYGgu5WdMV7x4BCkhA6Lk:v/G18PsG0EVtsvty80lhYGguaMV7yhD
Static task
static1
Behavioral task
behavioral1
Sample
0b789ac29a21f20d7607a222dba52439.exe
Resource
win7-20231215-en
Malware Config
Extracted
cybergate
v1.02.0
locura
proyectofinal.no-ip.biz:3461
3882PJJ5T48KSE
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
windatelogonawin.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
0b789ac29a21f20d7607a222dba52439
-
Size
348KB
-
MD5
0b789ac29a21f20d7607a222dba52439
-
SHA1
4f832f37c04db400b07be601ce62b4ba3178dafd
-
SHA256
b6460f61ef47bafb7236e175e141ec5292c87706a632d78b9ad754f966dc8d75
-
SHA512
1b7881ac182bc2c3f590f15e95ada700399bf715e323ae7d9b620134ad5d016caaf97b9369dbc0741a6be83be4fd1d3b16bae3ec7112eca95dd70a8e59693af1
-
SSDEEP
6144:ac/GNfg2APs5kFKEVtsX/tc580lhXYGgu5WdMV7x4BCkhA6Lk:v/G18PsG0EVtsvty80lhYGguaMV7yhD
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-