MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae7bf3a82ad6c39368d217f27e26739d757d5f09e70ba3fa8d65e6e2171d0ab7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CyberGate


Vendor detections: 5


Intelligence 5 IOCs YARA 5 File information Comments

SHA256 hash: ae7bf3a82ad6c39368d217f27e26739d757d5f09e70ba3fa8d65e6e2171d0ab7
SHA3-384 hash: 51d4f808cc2ff4b96e540ae95602dea4c65fc515763e43815b0c639dbc9c01ae0ef4fc756beb1c18df7d2bbb751f0fd0
SHA1 hash: e3adc4ad8f9c00f050ea466231cf362bc11f1b31
MD5 hash: 6ac2c89e95ab42db39f3f9ff68ad5bf3
humanhash: carpet-utah-venus-hawaii
File name:ae7bf3a82ad6c39368d217f27e26739d757d5f09e70ba3fa8d65e6e2171d0ab7
Download: download sample
Signature CyberGate
File size:777'905 bytes
First seen:2020-06-16 09:32:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:Bn0Ur5bRna5B7L09f2ZIymeVurdXVVVVVVVVVVVVVVVVVVVVVVVVVsL4AguCk+yC:yUdbRnaf7yfa/NVurd+L4AgPkLH8IVWz
Threatray 59 similar samples on MalwareBazaar
TLSH 40F4D0BBE8A6636DDB9483BB549DBF7292F37608A3534C0C349C339907646CC0F525A9
Reporter JAMESWT_WT
Tags:CyberGate

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2011-08-17 04:48:00 UTC
File Type:
PE (.Net Exe)
AV detection:
35 of 48 (72.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Drops startup file
Executes dropped EXE
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Malware_QA_update
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_cybergate_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_cybergate_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments