General

  • Target

    c5ae39d56379fdbf78a3086fd8c6f2e4

  • Size

    505KB

  • Sample

    240313-mv66zadb55

  • MD5

    c5ae39d56379fdbf78a3086fd8c6f2e4

  • SHA1

    911950eecd7143c2939e9c24d3e2cd5e45a76de0

  • SHA256

    86022d2e92af55096817732aeb70ab0095620c8a9f149db1c90efa8eb3eede37

  • SHA512

    c8da0589048e8ed3b24ad2099899be7b1ec13249f998bee57317210bae8bf1d8659266079908a6a4127d638241d5ec8e9dbccec75de4e48194bed4633f1f95c9

  • SSDEEP

    12288:RYU9YId0htnvAlcD7XVcySNQROIaNyrIcSXp+TMaPW4NKCnapjcz3q:hYNBpSTycC3q

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Opfer

C2

s0l1ng3n.myftp.org:3460

ipnoip.zapto.org:83

Mutex

WUAUW5S31614F6

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    swchost

  • install_file

    swhost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    The number of specified semaphore events for DosMuxSemWait are Loaded correctly. You can start your game now!

  • message_box_title

    S0L1NG3N MOD Script for Battlefield 2 has been installed.

  • password

    felsen

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      c5ae39d56379fdbf78a3086fd8c6f2e4

    • Size

      505KB

    • MD5

      c5ae39d56379fdbf78a3086fd8c6f2e4

    • SHA1

      911950eecd7143c2939e9c24d3e2cd5e45a76de0

    • SHA256

      86022d2e92af55096817732aeb70ab0095620c8a9f149db1c90efa8eb3eede37

    • SHA512

      c8da0589048e8ed3b24ad2099899be7b1ec13249f998bee57317210bae8bf1d8659266079908a6a4127d638241d5ec8e9dbccec75de4e48194bed4633f1f95c9

    • SSDEEP

      12288:RYU9YId0htnvAlcD7XVcySNQROIaNyrIcSXp+TMaPW4NKCnapjcz3q:hYNBpSTycC3q

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks