General

  • Target

    ee3ff5a705eaf5bca0e9da006cea59e28338ab3266b351c0b7783fb3d199cab5.exe

  • Size

    389KB

  • Sample

    241125-lxv12sxkcr

  • MD5

    886fb85c46a318d2a09b1ef007a75a3f

  • SHA1

    0da4690e6c862905fa84c1ba00931b60efdb502d

  • SHA256

    ee3ff5a705eaf5bca0e9da006cea59e28338ab3266b351c0b7783fb3d199cab5

  • SHA512

    092256a0c246ecadfede2c693645dec5b9b38a9be93be729e0f2270a5d7466e286a45287d4465a6cfcff767f06b35a38e6f56dc4ffc60128508b22cfee8d5530

  • SSDEEP

    6144:03A1YJFOfijYRa06ytsFLBTBFj2TozaYKFw0r7a/NuilDZEma05vxMAxg:EcYjQijKZ5eZJBFxaY5NNac5v6Axg

Malware Config

Extracted

Family

cybergate

Version

v3.4.2.2

Botnet

remote

C2

127.0.0.1:82

Mutex

4VM2KQR81PQT0E

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    Alex24

Targets

    • Target

      ee3ff5a705eaf5bca0e9da006cea59e28338ab3266b351c0b7783fb3d199cab5.exe

    • Size

      389KB

    • MD5

      886fb85c46a318d2a09b1ef007a75a3f

    • SHA1

      0da4690e6c862905fa84c1ba00931b60efdb502d

    • SHA256

      ee3ff5a705eaf5bca0e9da006cea59e28338ab3266b351c0b7783fb3d199cab5

    • SHA512

      092256a0c246ecadfede2c693645dec5b9b38a9be93be729e0f2270a5d7466e286a45287d4465a6cfcff767f06b35a38e6f56dc4ffc60128508b22cfee8d5530

    • SSDEEP

      6144:03A1YJFOfijYRa06ytsFLBTBFj2TozaYKFw0r7a/NuilDZEma05vxMAxg:EcYjQijKZ5eZJBFxaY5NNac5v6Axg

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks