General
-
Target
745cc01bc1314852fa2d16b830c8635d1371b225fb3fa806fffeba345529e7e5N.exe
-
Size
5.5MB
-
Sample
241127-wwmndsvjd1
-
MD5
9025149cec717a27dcf2f24057aca690
-
SHA1
e44ec3fa40b4e58f8e41a2181b9415a2c84f4f6d
-
SHA256
745cc01bc1314852fa2d16b830c8635d1371b225fb3fa806fffeba345529e7e5
-
SHA512
e0a48263b55bc2a70db8fab97370f7fb92344685f29fac508f0073e1d9b4884dac08e4e57cda873ebadb4fdea768104873ba04f4b488b15e79615480d21625ab
-
SSDEEP
6144:+eWqPBZKGF6Dlwyi4iIE8CuBVWQZNMrr63jaWAV5/f9oHtv:TPB8e6p+IEh6fMSOxV5/f0t
Static task
static1
Behavioral task
behavioral1
Sample
745cc01bc1314852fa2d16b830c8635d1371b225fb3fa806fffeba345529e7e5N.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.18.0 - Crack Version
2205
220520122153.no-ip.org:8021
15AG1AHC5YUFFK
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Defender WIndows
-
install_file
csrss.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
2205
-
regkey_hkcu
Defender WIndows
-
regkey_hklm
Defender WIndows
Targets
-
-
Target
745cc01bc1314852fa2d16b830c8635d1371b225fb3fa806fffeba345529e7e5N.exe
-
Size
5.5MB
-
MD5
9025149cec717a27dcf2f24057aca690
-
SHA1
e44ec3fa40b4e58f8e41a2181b9415a2c84f4f6d
-
SHA256
745cc01bc1314852fa2d16b830c8635d1371b225fb3fa806fffeba345529e7e5
-
SHA512
e0a48263b55bc2a70db8fab97370f7fb92344685f29fac508f0073e1d9b4884dac08e4e57cda873ebadb4fdea768104873ba04f4b488b15e79615480d21625ab
-
SSDEEP
6144:+eWqPBZKGF6Dlwyi4iIE8CuBVWQZNMrr63jaWAV5/f9oHtv:TPB8e6p+IEh6fMSOxV5/f0t
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2