Behavioral task
behavioral1
Sample
aeb0b441b7c815441e18d48c159b033a.exe
Resource
win7-20240221-en
General
-
Target
aeb0b441b7c815441e18d48c159b033a
-
Size
629KB
-
MD5
aeb0b441b7c815441e18d48c159b033a
-
SHA1
4c4b45c03c3be37176811ba07e9ee6e8fd800342
-
SHA256
f1f9b2637c8109b49bcdf7d231e08dbdaaf11503f8255ffa5c2cf18056bbdf1d
-
SHA512
caf5b492240853dc431333e05f27cb9cf7b293991dd24264ce4f5be766bc8542519749ed13c824074e22d348f6ebf6de8b2ebf6f1565fbb849d86dd142c719d6
-
SSDEEP
6144:bbYD66R9tdRBRBYwPC7BdYwwsiYGBToREujB5wZl5DLfVq4mET1z:XYD66VFYeC7Blwsi9D5LfV1F1z
Malware Config
Extracted
cybergate
2.7 Beta 02
vítima
127.0.0.1:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource aeb0b441b7c815441e18d48c159b033a
Files
-
aeb0b441b7c815441e18d48c159b033a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
CODE Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 573KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ