MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5ae536cd31af5c2efcd885d1eb93bf30d2cdc32cebabdb298b8a4f69fcbccecc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cybergate


Vendor detections: 15


Intelligence 15 IOCs YARA 16 File information Comments

SHA256 hash: 5ae536cd31af5c2efcd885d1eb93bf30d2cdc32cebabdb298b8a4f69fcbccecc
SHA3-384 hash: c342cc689923aef5d66f19bbdd800631bad3e7761ff366cb2242786f1fb42f99e650b49ef96051802cefedf4e6373715
SHA1 hash: db4c878a910f3d1031f1817e05589747e3a5345a
MD5 hash: 46f87c1d7e3c60258166f40d3d4532da
humanhash: oscar-may-fanta-ink
File name:5AE536CD31AF5C2EFCD885D1EB93BF30D2CDC32CEBABD.exe
Download: download sample
Signature Cybergate
File size:438'347 bytes
First seen:2023-12-03 16:40:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1ca9f77a798c9b4f0e454a9da75459d (13 x Cybergate)
ssdeep 12288:huMwMBi8vvrHxVPKyv2m77sZB07FxObO325:hHwN8vrx52t07FQa8
TLSH T1949412E6F4559C73DBA18AFD1D2CD684EB6D3E222C27509399FD3F88C71C262160D1A2
TrID 35.7% (.EXE) Win32 Executable (generic) (4505/5/1)
16.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
16.0% (.EXE) OS/2 Executable (generic) (2029/13)
15.8% (.EXE) Generic Win/DOS Executable (2002/3)
15.8% (.EXE) DOS Executable Generic (2000/1)
Reporter abuse_ch
Tags:CyberGate exe


Avatar
abuse_ch
Cybergate C2:
200.232.236.60:4448

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Delayed writing of the file
DNS request
Sending a custom TCP request
Creating a process from a recently created file
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm anubis bublik explorer greyware jorik lolbin overlay packed shell32 spynet virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CyberGate
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected CyberGate RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Spyrat
Status:
Malicious
First seen:
2023-12-01 22:51:00 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
23 of 23 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
cybergate
Score:
  10/10
Tags:
family:cybergate botnet:remote upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
UPX packed file
Malware Config
C2 Extraction:
testedeip.no-ip.org:4448
8.tcp.ngrok.io:15656
192.168.200.38:4448
testedeip1.ddns.net:4448
Unpacked files
SH256 hash:
5ae536cd31af5c2efcd885d1eb93bf30d2cdc32cebabdb298b8a4f69fcbccecc
MD5 hash:
46f87c1d7e3c60258166f40d3d4532da
SHA1 hash:
db4c878a910f3d1031f1817e05589747e3a5345a
Detections:
win_cybergate_w0 INDICATOR_SUSPICIOUS_EXE_SandboxProductID SUSP_XORed_MSDOS_Stub_Message
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_Dlls
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxProductID
Author:ditekSHen
Description:Detects binaries and memory artifcats referencing sandbox product IDs
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:Malware_QA_update
Author:Florian Roth (Nextron Systems)
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:Malware_QA_update_RID2DAD
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_CyberGate_c219a2f3
Author:Elastic Security
Rule name:win_cybergate_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_cybergate_w0
Author:Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments