MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10214ec31eefe2eabd38262e9a404f781949bd09ff3831ffd3a9d9f9c8a277eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CyberGate


Vendor detections: 15


Intelligence 15 IOCs YARA 20 File information Comments

SHA256 hash: 10214ec31eefe2eabd38262e9a404f781949bd09ff3831ffd3a9d9f9c8a277eb
SHA3-384 hash: a2cbf22b0863d4f43064efe9d581b7ee403778aa48fa518488de25865c677c30785d351684eaa0188ee2e24a3cec7210
SHA1 hash: 7465d0840358b7683ea6ee6dfcc4049906926046
MD5 hash: 039a35282f6bdc426bb5df5990d16daa
humanhash: finch-hydrogen-victor-paris
File name:PluginFlash.exe
Download: download sample
Signature CyberGate
File size:1'093'632 bytes
First seen:2023-08-27 09:08:33 UTC
Last seen:2024-08-20 14:31:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:povIiGZq/sAEoRzQjsN5iOh6Byf7uWGNBrfcPIRqjWEX5fbEsGfFrwBwqyYrHlD9:pogSdksw9N+6CIOxDM+37fs
Threatray 58 similar samples on MalwareBazaar
TLSH T1623588346DEB112FE173EE797DF43595C99E7B6327065C1E10A3038B4A22B85DE9282C
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter dancho_danchev
Tags:CyberGate exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
290
Origin country :
BG BG
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://habbotips.free.fr/PluginFlash.exe
Verdict:
Malicious activity
Analysis date:
2019-11-15 01:22:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% directory
Launching a process
Creating a file
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Creating a window
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Searching for the window
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
CyberGate
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Contains functionality to modify clipboard data
Drops PE files with benign system names
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected CyberGate RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1298163 Sample: PluginFlash.exe Startdate: 27/08/2023 Architecture: WINDOWS Score: 100 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 6 other signatures 2->44 9 PluginFlash.exe 1 5 2->9         started        13 svchost.exe 5 2->13         started        15 svchost.exe 4 2->15         started        17 2 other processes 2->17 process3 file4 36 C:\Users\user\AppData\Roaming\svchost.exe, PE32 9->36 dropped 54 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->54 56 Sample uses process hollowing technique 9->56 58 Drops PE files with benign system names 9->58 19 vbc.exe 1 9->19         started        60 Antivirus detection for dropped file 13->60 62 Multi AV Scanner detection for dropped file 13->62 64 Machine Learning detection for dropped file 13->64 22 vbc.exe 13->22         started        66 Writes to foreign memory regions 15->66 68 Allocates memory in foreign processes 15->68 70 Injects a PE file into a foreign processes 15->70 24 vbc.exe 15->24         started        signatures5 process6 signatures7 46 Found evasive API chain (may stop execution after checking mutex) 19->46 48 Contains functionality to inject threads in other processes 19->48 50 Contains functionality to inject code into remote processes 19->50 52 Contains functionality to modify clipboard data 19->52 26 vbc.exe 3 6 19->26         started        28 iexplore.exe 19->28         started        process8 process9 30 vbc.exe 1 26->30         started        32 conhost.exe 26->32         started        process10 34 conhost.exe 30->34         started       
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2011-06-28 04:19:00 UTC
File Type:
PE (.Net Exe)
AV detection:
24 of 38 (63.16%)
Threat level:
  2/5
Result
Malware family:
cybergate
Score:
  10/10
Tags:
family:cybergate botnet:habbo persistence stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Uses the VBS compiler for execution
CyberGate, Rebhip
Malware Config
C2 Extraction:
teemy.no-ip.org:86
Unpacked files
SH256 hash:
9c4979eeb3b37c074bb960382a24610344dc0520e42e1283681acc087c0c4e6c
MD5 hash:
1268ff8f3a5a4b63e87d93e26712bf9c
SHA1 hash:
388f0d1faa03328fed1e5ad475704dc8062686eb
SH256 hash:
81b39548e23cbb9f4fe31c64b5db44cd99dd8cd188cd76af71373a114371b2a6
MD5 hash:
e3ea79182ca57cbe58165fa3d3ccfc5c
SHA1 hash:
9df632fd42a024bf22bf591b6d95129c604d1919
SH256 hash:
a4440447519aacaa46db4d9f73be92e27b34ded773a33c286b4e498cddd9ae7f
MD5 hash:
575e7846ca104f54be978fac4fb0b377
SHA1 hash:
3b8da4a48333ec87f035be23015c5c6af304d882
Detections:
win_cybergate_w0 win_cybergate_auto
SH256 hash:
10214ec31eefe2eabd38262e9a404f781949bd09ff3831ffd3a9d9f9c8a277eb
MD5 hash:
039a35282f6bdc426bb5df5990d16daa
SHA1 hash:
7465d0840358b7683ea6ee6dfcc4049906926046
Malware family:
CyberGate
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_Dlls
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxProductID
Author:ditekSHen
Description:Detects binaries and memory artifcats referencing sandbox product IDs
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:Malware_QA_update
Author:Florian Roth (Nextron Systems)
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:Malware_QA_update_RID2DAD
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:MALWARE_Win_CyberGate
Author:ditekSHen
Description:Detects CyberGate/Spyrat/Rebhip RTA
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RAT_CyberGate
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects CyberGate RAT
Reference:http://malwareconfig.com/stats/CyberGate
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_cybergate_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_cybergate_w0
Author:Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CyberGate

Executable exe 10214ec31eefe2eabd38262e9a404f781949bd09ff3831ffd3a9d9f9c8a277eb

(this sample)

  
Delivery method
Distributed via web download

Comments