General
-
Target
bfa0d07a1300bfe1cdcfe006a5212fc1c09912ac6edc96d6954b88666485246b.exe
-
Size
296KB
-
Sample
241210-ktxj2a1qgw
-
MD5
4f66eae24504c88e93269791399b6df6
-
SHA1
ea5bde4dffee7f95acbd6ec0d2d015fd89a34e8f
-
SHA256
bfa0d07a1300bfe1cdcfe006a5212fc1c09912ac6edc96d6954b88666485246b
-
SHA512
d0e1ffdfb7c5fab064a90a50b3d741313b6520854885ff489b4013a0b1d01b623cfdc45196825a33e18abf35b52cfef79c2a96c9dae1069eb368b9909659ea23
-
SSDEEP
6144:MOpsl8lqXhdBCkWYxuukP1pjSKSNVkq/MVJbw:MwsltTBd47GLRMTbw
Behavioral task
behavioral1
Sample
bfa0d07a1300bfe1cdcfe006a5212fc1c09912ac6edc96d6954b88666485246b.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
v1.07.5
remote22
86.51.251.14:81
KO4D5Y5B0SCYD2
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
0108081
Targets
-
-
Target
bfa0d07a1300bfe1cdcfe006a5212fc1c09912ac6edc96d6954b88666485246b.exe
-
Size
296KB
-
MD5
4f66eae24504c88e93269791399b6df6
-
SHA1
ea5bde4dffee7f95acbd6ec0d2d015fd89a34e8f
-
SHA256
bfa0d07a1300bfe1cdcfe006a5212fc1c09912ac6edc96d6954b88666485246b
-
SHA512
d0e1ffdfb7c5fab064a90a50b3d741313b6520854885ff489b4013a0b1d01b623cfdc45196825a33e18abf35b52cfef79c2a96c9dae1069eb368b9909659ea23
-
SSDEEP
6144:MOpsl8lqXhdBCkWYxuukP1pjSKSNVkq/MVJbw:MwsltTBd47GLRMTbw
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1