General
-
Target
d896b0ccf5e61bac3fbfa93b101a504d04404e87a6f30e927a1b17b6484c571bN.exe
-
Size
376KB
-
Sample
241202-tdseta1kds
-
MD5
cac00ec29111be2ec26ad824ae738ba0
-
SHA1
1c5f85d6f8167443b1c966ef9c9d684626495470
-
SHA256
d896b0ccf5e61bac3fbfa93b101a504d04404e87a6f30e927a1b17b6484c571b
-
SHA512
db9853281bb18a1ce7f6b18704ca46cd1db7a65e07b037b253da3fc376c849e1ebed439cc41fd0fd4171d5157b638b337d754998532776dd6f28d7e92ab4abfe
-
SSDEEP
6144:O54tkd+XBaN+muEfrDFGO2AjHQGp/MBdCLE7eZfz1ugWb22r6dszYcvspHz1Fa0/:O54tkoRa4m7f3FGOfjwGpkwFIgWbLe6c
Static task
static1
Behavioral task
behavioral1
Sample
d896b0ccf5e61bac3fbfa93b101a504d04404e87a6f30e927a1b17b6484c571bN.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.6
GENINHO
unidasdns.no-ip.org:1000
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Intel
-
install_file
iusb3.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Plugin Host Controller
-
message_box_title
Host Controller !
-
password
abcd1234
-
regkey_hkcu
Host Controller
-
regkey_hklm
Intel
Targets
-
-
Target
d896b0ccf5e61bac3fbfa93b101a504d04404e87a6f30e927a1b17b6484c571bN.exe
-
Size
376KB
-
MD5
cac00ec29111be2ec26ad824ae738ba0
-
SHA1
1c5f85d6f8167443b1c966ef9c9d684626495470
-
SHA256
d896b0ccf5e61bac3fbfa93b101a504d04404e87a6f30e927a1b17b6484c571b
-
SHA512
db9853281bb18a1ce7f6b18704ca46cd1db7a65e07b037b253da3fc376c849e1ebed439cc41fd0fd4171d5157b638b337d754998532776dd6f28d7e92ab4abfe
-
SSDEEP
6144:O54tkd+XBaN+muEfrDFGO2AjHQGp/MBdCLE7eZfz1ugWb22r6dszYcvspHz1Fa0/:O54tkoRa4m7f3FGOfjwGpkwFIgWbLe6c
-
Cybergate family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-