General
-
Target
db1ac31ae2d0da0fb541828501fa0998
-
Size
796KB
-
Sample
240321-jvj5nagd2s
-
MD5
db1ac31ae2d0da0fb541828501fa0998
-
SHA1
fe4edaf68bdf91b88fb0df9a7cd2a421bbd40672
-
SHA256
c7640ec2333c3b41dadd8db433a2f56c484b637e14d9df5580207e7e69dd2ca6
-
SHA512
c202c940c9e4e87bfcdbcce5d43cf65c257f38e8ea35fa200097512e0c587cf2ca3229fc80c89335880d0337810340dec24d312bfc60af92a69d91951ddb307f
-
SSDEEP
12288:9hjaCWJzqRIlXn5tcMDxkB1UoRF0C3D/CA6HH1okoK/trCnfCEBbAGzoXhsCM1qs:5+nzcXBMsUp1JKPzEd
Static task
static1
Behavioral task
behavioral1
Sample
db1ac31ae2d0da0fb541828501fa0998.exe
Resource
win7-20240221-en
Malware Config
Extracted
cybergate
v1.15.4
Bot
hexrut.dlinkddns.com:82
FHQI6T83R0F1VS
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
kehek
Targets
-
-
Target
db1ac31ae2d0da0fb541828501fa0998
-
Size
796KB
-
MD5
db1ac31ae2d0da0fb541828501fa0998
-
SHA1
fe4edaf68bdf91b88fb0df9a7cd2a421bbd40672
-
SHA256
c7640ec2333c3b41dadd8db433a2f56c484b637e14d9df5580207e7e69dd2ca6
-
SHA512
c202c940c9e4e87bfcdbcce5d43cf65c257f38e8ea35fa200097512e0c587cf2ca3229fc80c89335880d0337810340dec24d312bfc60af92a69d91951ddb307f
-
SSDEEP
12288:9hjaCWJzqRIlXn5tcMDxkB1UoRF0C3D/CA6HH1okoK/trCnfCEBbAGzoXhsCM1qs:5+nzcXBMsUp1JKPzEd
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-