General
-
Target
57836661773d8d7db1dcd9a39c140416
-
Size
308KB
-
Sample
240113-avz2fahdd8
-
MD5
57836661773d8d7db1dcd9a39c140416
-
SHA1
8e5abe34f55d2083da1a1c8bde323f172aa6719d
-
SHA256
72d27a9e3dbbe2499ef6247806eb1109b56f8b748667930e854cb00c60cc47f8
-
SHA512
0dacc1c5322b6835a43faf487caec7ad25fbac095a382dffb3c642d9372e8b0a7f12c67a4efee1bd3086c7787f3bed45993d662a9cea0a00463137b651d01af0
-
SSDEEP
6144:doyMEgbVeaUm+XXWJsRSK8VwwnSXIWTv0Fc7/7R9+YHciXrwvHuA//:hg5ep43KkwtXrTKc7jR9+YHc4w7/
Static task
static1
Behavioral task
behavioral1
Sample
57836661773d8d7db1dcd9a39c140416.exe
Resource
win7-20231215-en
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
spy
jurizaran0ff.zapto.org:2050
1DKLHH3T02R81V
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs
-
ftp_interval
30
-
ftp_password
ficken123
-
ftp_port
21
-
ftp_server
fbook123.fb.ohost.de
-
ftp_username
ftp1802466
-
injected_process
explorer.exe
-
install_dir
dll
-
install_file
winconfig32.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
Cannot open file
-
message_box_title
Error
-
password
ficken123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
latentbot
jurizaran0ff.zapto.org
Targets
-
-
Target
57836661773d8d7db1dcd9a39c140416
-
Size
308KB
-
MD5
57836661773d8d7db1dcd9a39c140416
-
SHA1
8e5abe34f55d2083da1a1c8bde323f172aa6719d
-
SHA256
72d27a9e3dbbe2499ef6247806eb1109b56f8b748667930e854cb00c60cc47f8
-
SHA512
0dacc1c5322b6835a43faf487caec7ad25fbac095a382dffb3c642d9372e8b0a7f12c67a4efee1bd3086c7787f3bed45993d662a9cea0a00463137b651d01af0
-
SSDEEP
6144:doyMEgbVeaUm+XXWJsRSK8VwwnSXIWTv0Fc7/7R9+YHciXrwvHuA//:hg5ep43KkwtXrTKc7jR9+YHc4w7/
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-