MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b23d910f08643f0c79f08297aad168634e6f5a5552eb469f4b7e0bce2b0568b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cybergate


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 10 File information Comments 1

SHA256 hash: b23d910f08643f0c79f08297aad168634e6f5a5552eb469f4b7e0bce2b0568b5
SHA3-384 hash: d2d5f1e5fa43a9f1f8d8c9517a1774467890e63d5a8ceff13698e983e294db3d65f9acf1b4375b520966a23f7eb7dba4
SHA1 hash: a5720fac0e88fd0c5c717ea5bb9f451f1ef7aa43
MD5 hash: f7533c6cdcaf5f39b1656e6d93644639
humanhash: foxtrot-vermont-foxtrot-alaska
File name:B23D910F08643F0C79F08297AAD168634E6F5A5552EB4.exe
Download: download sample
Signature Cybergate
File size:403'625 bytes
First seen:2021-05-07 14:36:38 UTC
Last seen:2021-05-07 16:17:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 20ef06b55514d8973dd69f4a1c7655c2 (1 x Cybergate)
ssdeep 12288:gGyl86V+Lm6EZDw1ngbLWRVLIJRQ5QvuJ:gNXCtg2u4
TLSH 6D840138A6E2497BC003D53E9CC284833C64B58789538D55D68FB366A8275B0AFFDB74
Reporter abuse_ch
Tags:CyberGate exe


Avatar
abuse_ch
Cybergate C2:
86.18.99.199:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
86.18.99.199:81 https://threatfox.abuse.ch/ioc/31683/

Intelligence


File Origin
# of uploads :
3
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Replacing files
Creating a process from a recently created file
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
DNS request
Connecting to a non-recommended domain
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Delayed writing of the file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CyberGate
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Contains functionality to register a low level keyboard hook
Creates an undocumented autostart registry key
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected CyberGate RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-05-04 23:56:00 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
31 of 47 (65.96%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Loads dropped DLL
Adds policy Run key to start application
Executes dropped EXE
UPX packed file
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
9c4979eeb3b37c074bb960382a24610344dc0520e42e1283681acc087c0c4e6c
MD5 hash:
1268ff8f3a5a4b63e87d93e26712bf9c
SHA1 hash:
388f0d1faa03328fed1e5ad475704dc8062686eb
SH256 hash:
57a5a6c5536d3fdee166a89a073ea538b59ac5e859d9cdb64d6ebb8b506f6973
MD5 hash:
d2f8f274e3d66fafcce2c58e85bb744a
SHA1 hash:
ec5b39424f0250dd554d9e2fbc86da051a04286b
Detections:
win_cybergate_w0 win_cybergate_auto
SH256 hash:
de08e8b6bd9f1b48f7667726174fac1aa5b70460a8d7fb77db36f370a4e57e6b
MD5 hash:
1e5c6d57441787f005535988a78822d3
SHA1 hash:
ff43dc96c854ce1fc7944a978e5fbabab2f8cd1f
SH256 hash:
b23d910f08643f0c79f08297aad168634e6f5a5552eb469f4b7e0bce2b0568b5
MD5 hash:
f7533c6cdcaf5f39b1656e6d93644639
SHA1 hash:
a5720fac0e88fd0c5c717ea5bb9f451f1ef7aa43
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxProductID
Author:ditekSHen
Description:Detects binaries and memory artifcats referencing sandbox product IDs
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Malware_QA_update
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:MALWARE_Win_CyberGate
Author:ditekSHen
Description:Detects CyberGate/Spyrat/Rebhip RTA
Rule name:RAT_CyberGate
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects CyberGate RAT
Reference:http://malwareconfig.com/stats/CyberGate
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:VMware_detection_bin_mem
Author:James_inthe_box
Description:VMWare detection
Rule name:win_cybergate_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_cybergate_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-07 15:02:34 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
1) [C0019] Data Micro-objective::Check String
2) [C0026.001] Data Micro-objective::Base64::Encode Data