MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4acdef5bab397d24a91955f07803c10089bf24d570159f779284408f3a2d1141. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CyberGate


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: 4acdef5bab397d24a91955f07803c10089bf24d570159f779284408f3a2d1141
SHA3-384 hash: 8974cef84c4ffe17c4f8cb0a3949d159168d71699bbd2ee6db9e050e12570ca27c741ea07ce42af85f8895d5bb32886e
SHA1 hash: 52fd2d372bc658b40d87ea78d8eb3844128d022f
MD5 hash: 82abb3648ac3b46ce91801ae3d7bb2bc
humanhash: wisconsin-pip-florida-north
File name:82abb3648ac3b46ce91801ae3d7bb2bc.exe
Download: download sample
Signature CyberGate
File size:664'115 bytes
First seen:2022-09-07 09:28:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 12288:nTcFngzqfSbTPw9/A813WS8UgjCSxAO9nax5+4LFJswwwUkVDTOQe:TcVkKSbTI948dWS81VaD5+KJswwwUkV6
Threatray 22 similar samples on MalwareBazaar
TLSH T184E4126236EA84F6D15221708644FF7550B5DF544B381EFB33C0FD1FBB3A982A12A299
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8e333b33331b67a6 (1 x CyberGate)
Reporter abuse_ch
Tags:CyberGate exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FME (1).exe
Verdict:
Suspicious activity
Analysis date:
2022-05-28 11:11:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Searching for the window
Enabling the 'hidden' option for files in the %temp% directory
Creating a file in the %AppData% subdirectories
DNS request
Sending a custom TCP request
Сreating synchronization primitives
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
37 / 100
Signature
Sample or dropped binary is a compiled AutoHotkey binary
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 698745 Sample: 9ISNeRdj1B.exe Startdate: 07/09/2022 Architecture: WINDOWS Score: 37 7 9ISNeRdj1B.exe 3 2->7         started        file3 21 C:\Users\user\AppData\Local\Temp\...\FME.exe, PE32+ 7->21 dropped 10 FME.exe 18 7->10         started        process4 dnsIp5 27 raw.githubusercontent.com 185.199.108.133, 443, 49706 FASTLYUS Netherlands 10->27 23 C:\Users\user\AppData\Roaming\FMEV2\FME.exe, PE32+ 10->23 dropped 25 C:\Users\user\AppData\...\7zS01A5A97E.exe, MS-DOS 10->25 dropped 31 Sample or dropped binary is a compiled AutoHotkey binary 10->31 15 7zS01A5A97E.exe 15 10->15         started        file6 signatures7 process8 signatures9 33 Sample or dropped binary is a compiled AutoHotkey binary 15->33 18 FME.exe 15->18         started        process10 signatures11 29 Sample or dropped binary is a compiled AutoHotkey binary 18->29
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
NTFS ADS
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
4acdef5bab397d24a91955f07803c10089bf24d570159f779284408f3a2d1141
MD5 hash:
82abb3648ac3b46ce91801ae3d7bb2bc
SHA1 hash:
52fd2d372bc658b40d87ea78d8eb3844128d022f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:html_auto_download_b64
Author:Tdawg
Description:html auto download
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist
Rule name:win_cybergate_w0
Author:Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CyberGate

Executable exe 4acdef5bab397d24a91955f07803c10089bf24d570159f779284408f3a2d1141

(this sample)

  
Delivery method
Distributed via web download

Comments