General

  • Target

    4a65f8e335381eb93f30036bc05652e5

  • Size

    670KB

  • Sample

    240108-epwt2saggm

  • MD5

    4a65f8e335381eb93f30036bc05652e5

  • SHA1

    c56462f46ad15e2fa3fd044eb4c2476e41abf0f9

  • SHA256

    cfe88ff0c1d88dae161cab2dfc9381d8d4cffcde1ba61f0fdc48dac466c56531

  • SHA512

    4e89cc10ea9587e9c85b0bdb16c6cf27022cfe8f5c5b1866c0df3c61b6a2bb4b54865c6c2d45fb81da12d60d8d43f96c46a0689f465674313ff876fa2c74a891

  • SSDEEP

    12288:fw80KZh/N1ty6xa8WmlgsaIihanZryw//aMs2yRUPe9uqyS1uqc9lui0:fw80Kx1AiW2V9Mw/SlBwac9Yi0

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Vítima2702

C2

scorpiontrilogy.no-ip.info:8000

scorpiontrilogy22.no-ip.info:8000

scorpiontrilogy22.no-ip.org:8000

Mutex

monitor

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    system32

  • install_file

    system.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      4a65f8e335381eb93f30036bc05652e5

    • Size

      670KB

    • MD5

      4a65f8e335381eb93f30036bc05652e5

    • SHA1

      c56462f46ad15e2fa3fd044eb4c2476e41abf0f9

    • SHA256

      cfe88ff0c1d88dae161cab2dfc9381d8d4cffcde1ba61f0fdc48dac466c56531

    • SHA512

      4e89cc10ea9587e9c85b0bdb16c6cf27022cfe8f5c5b1866c0df3c61b6a2bb4b54865c6c2d45fb81da12d60d8d43f96c46a0689f465674313ff876fa2c74a891

    • SSDEEP

      12288:fw80KZh/N1ty6xa8WmlgsaIihanZryw//aMs2yRUPe9uqyS1uqc9lui0:fw80Kx1AiW2V9Mw/SlBwac9Yi0

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks