MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d725c799e8787ef98e26cb025144cbe405aef31bc4ddd2011c80c09efa87400. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CyberGate


Vendor detections: 4


Intelligence 4 IOCs YARA 5 File information Comments

SHA256 hash: 2d725c799e8787ef98e26cb025144cbe405aef31bc4ddd2011c80c09efa87400
SHA3-384 hash: ab5a664b106ecb7417fd6f9b08dbd090c714273834c576e7c1f449cd7a60d5449246af4445bd81ce393de18c78866a29
SHA1 hash: 0620ca65d7192e17837ca254d9097f760946d84f
MD5 hash: c50289ae23d0efcb2beb931e02308bed
humanhash: asparagus-ink-six-violet
File name:2d725c799e8787ef98e26cb025144cbe405aef31bc4ddd2011c80c09efa87400
Download: download sample
Signature CyberGate
File size:1'710'979 bytes
First seen:2020-06-10 07:33:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 73d12a96fab08773e2657237992c3c27 (2 x njrat, 1 x CyberGate, 1 x DCRat)
ssdeep 24576:j9kZWCMuo4dTVOrZhXnCEoSKl2yGa0qAQ8vhY8h2zzP2fSAd+09qHmQbwIpmM:FWOrZhXnyZGI8Zh2zzP2an04GQkmP
Threatray 317 similar samples on MalwareBazaar
TLSH 4885CF10BACA7DE0E99B04718DB3F324522CFD2C6AA55E827E4E21261B750D3363D56F
Reporter JAMESWT_WT
Tags:CyberGate

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2020-06-04 11:06:38 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
41 of 48 (85.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Adds policy Run key to start application
Executes dropped EXE
Modifies Installed Components in the registry
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Malware_QA_update
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:RAT_CyberGate
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects CyberGate RAT
Reference:http://malwareconfig.com/stats/CyberGate
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_cybergate_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_cybergate_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments