General
-
Target
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b
-
Size
577KB
-
Sample
250314-f5195stxcx
-
MD5
68954c7245521d519cbb3a385cb2c148
-
SHA1
a9ca115a8ba053d34b346712258cd38569fa9ff0
-
SHA256
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b
-
SHA512
2c8c26c67d486d43f847fbb95d7e01ba38f4f6a57fb1ccf3b216909b2bd4228de68920e062711e48356b519660056281ae4f63e0fa743cb164004be755ce280f
-
SSDEEP
12288:3FRfn0O/l1hgLzINJzTPudj+NVjVsrhwyvywWHb06ePuwCuqtgjN/yZsZra:nn//lXqzaTPQ+Wrhw0y5LsuwCXGym
Static task
static1
Behavioral task
behavioral1
Sample
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
127.0.0.1:288
***MUTEX***
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
t?tulo da mensagem
-
password
abcd1234
Targets
-
-
Target
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b
-
Size
577KB
-
MD5
68954c7245521d519cbb3a385cb2c148
-
SHA1
a9ca115a8ba053d34b346712258cd38569fa9ff0
-
SHA256
8cf05013debe5bfebfb43cd6ea093581f9fb33179d3297cde5d59f0e5cb9e39b
-
SHA512
2c8c26c67d486d43f847fbb95d7e01ba38f4f6a57fb1ccf3b216909b2bd4228de68920e062711e48356b519660056281ae4f63e0fa743cb164004be755ce280f
-
SSDEEP
12288:3FRfn0O/l1hgLzINJzTPudj+NVjVsrhwyvywWHb06ePuwCuqtgjN/yZsZra:nn//lXqzaTPQ+Wrhw0y5LsuwCXGym
-
Cybergate family
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-