General
-
Target
c512bb486ee7428d22e364a627faa83f
-
Size
675KB
-
Sample
240313-fz9pbsdf6x
-
MD5
c512bb486ee7428d22e364a627faa83f
-
SHA1
c8c8338810c8fb10ac29adbf89b224406ab026ce
-
SHA256
e578d57a7eeacf007eb83cbf053f3f78afedaeab18a3f8da8e40f9db5bb41c77
-
SHA512
fc20b3807a47a9301976150a0edb3c9ca723c678d0d5e92c281e593c4aed8fdd364af9121b8ca9db2294f962d06c53c51e59292749fe725f8f616bb3cdc775b0
-
SSDEEP
12288:dBPDXS5Dkk6op3Yywy2CAynxd51IpTqtVQzR2OVvrKIaApS:u5Dkk6wYywy2+pCTDrK
Static task
static1
Behavioral task
behavioral1
Sample
c512bb486ee7428d22e364a627faa83f.exe
Resource
win7-20240221-en
Malware Config
Extracted
cybergate
2.6
Server
tyfnanl.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Media
-
install_file
rundll32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
rundll32.exe
-
regkey_hklm
rundll32.exe
Targets
-
-
Target
c512bb486ee7428d22e364a627faa83f
-
Size
675KB
-
MD5
c512bb486ee7428d22e364a627faa83f
-
SHA1
c8c8338810c8fb10ac29adbf89b224406ab026ce
-
SHA256
e578d57a7eeacf007eb83cbf053f3f78afedaeab18a3f8da8e40f9db5bb41c77
-
SHA512
fc20b3807a47a9301976150a0edb3c9ca723c678d0d5e92c281e593c4aed8fdd364af9121b8ca9db2294f962d06c53c51e59292749fe725f8f616bb3cdc775b0
-
SSDEEP
12288:dBPDXS5Dkk6op3Yywy2CAynxd51IpTqtVQzR2OVvrKIaApS:u5Dkk6wYywy2+pCTDrK
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-