SYMBOLCOMMON_NAMEaka. SYNONYMS
win.cybergate (Back to overview)

CyberGate

aka: Rebhip
URLhaus      

There is no description at this point.

References
2020-01-31ReversingLabsRobert Simmons
@online{simmons:20200131:rats:d8a4021, author = {Robert Simmons}, title = {{RATs in the Library: Remote Access Trojans Hide in Plain "Public" Site}}, date = {2020-01-31}, organization = {ReversingLabs}, url = {https://blog.reversinglabs.com/blog/rats-in-the-library}, language = {English}, urldate = {2020-02-03} } RATs in the Library: Remote Access Trojans Hide in Plain "Public" Site
CyberGate LimeRAT NjRAT Quasar RAT Revenge RAT
2017-07-18ElasticAshkan Hosseini
@online{hosseini:20170718:ten:af036b3, author = {Ashkan Hosseini}, title = {{Ten process injection techniques: A technical survey of common and trending process injection techniques}}, date = {2017-07-18}, organization = {Elastic}, url = {https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process}, language = {English}, urldate = {2020-07-15} } Ten process injection techniques: A technical survey of common and trending process injection techniques
Cryakl CyberGate Dridex FinFisher RAT Locky
2017-07-18EndgameAshkan Hosseini
@online{hosseini:20170718:ten:fa1e393, author = {Ashkan Hosseini}, title = {{Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques}}, date = {2017-07-18}, organization = {Endgame}, url = {https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process}, language = {English}, urldate = {2020-01-09} } Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques
CyberGate
2015-12-08The CitizenlabJohn Scott-Railton, Morgan Marquis-Boire, Claudio Guarnieri, Marion Marschalek
@online{scottrailton:20151208:packrat:5f9bffa, author = {John Scott-Railton and Morgan Marquis-Boire and Claudio Guarnieri and Marion Marschalek}, title = {{Packrat: Seven Years of a South American Threat Actor}}, date = {2015-12-08}, organization = {The Citizenlab}, url = {https://citizenlab.ca/2015/12/packrat-report/}, language = {English}, urldate = {2020-05-18} } Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
Yara Rules
[TLP:WHITE] win_cybergate_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_cybergate_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.cybergate"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { e8???????? 8b55fc 8a541aff 80f2bc 885418ff 43 }
            // n = 6, score = 700
            //   e8????????           |                     
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   8a541aff             | mov                 dl, byte ptr [edx + ebx - 1]
            //   80f2bc               | xor                 dl, 0xbc
            //   885418ff             | mov                 byte ptr [eax + ebx - 1], dl
            //   43                   | inc                 ebx

        $sequence_1 = { ba???????? e8???????? 6a00 6a01 57 ffd6 83f801 }
            // n = 7, score = 700
            //   ba????????           |                     
            //   e8????????           |                     
            //   6a00                 | push                0
            //   6a01                 | push                1
            //   57                   | push                edi
            //   ffd6                 | call                esi
            //   83f801               | cmp                 eax, 1

        $sequence_2 = { c745fc00000000 8b75fc c1e602 017308 8b07 8b4008 8b00 }
            // n = 7, score = 700
            //   c745fc00000000       | mov                 dword ptr [ebp - 4], 0
            //   8b75fc               | mov                 esi, dword ptr [ebp - 4]
            //   c1e602               | shl                 esi, 2
            //   017308               | add                 dword ptr [ebx + 8], esi
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   8b4008               | mov                 eax, dword ptr [eax + 8]
            //   8b00                 | mov                 eax, dword ptr [eax]

        $sequence_3 = { 648920 53 8d45fc e8???????? 8b45fc b903000000 ba01000000 }
            // n = 7, score = 700
            //   648920               | mov                 dword ptr fs:[eax], esp
            //   53                   | push                ebx
            //   8d45fc               | lea                 eax, [ebp - 4]
            //   e8????????           |                     
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   b903000000           | mov                 ecx, 3
            //   ba01000000           | mov                 edx, 1

        $sequence_4 = { 7417 8d45ec e8???????? 8b55ec }
            // n = 4, score = 700
            //   7417                 | je                  0x19
            //   8d45ec               | lea                 eax, [ebp - 0x14]
            //   e8????????           |                     
            //   8b55ec               | mov                 edx, dword ptr [ebp - 0x14]

        $sequence_5 = { 8b4df8 8b55fc b802000080 e8???????? 33c0 }
            // n = 5, score = 700
            //   8b4df8               | mov                 ecx, dword ptr [ebp - 8]
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   b802000080           | mov                 eax, 0x80000002
            //   e8????????           |                     
            //   33c0                 | xor                 eax, eax

        $sequence_6 = { 8b55fc 8a541aff 80f2bc 885418ff 43 4e }
            // n = 6, score = 700
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   8a541aff             | mov                 dl, byte ptr [edx + ebx - 1]
            //   80f2bc               | xor                 dl, 0xbc
            //   885418ff             | mov                 byte ptr [eax + ebx - 1], dl
            //   43                   | inc                 ebx
            //   4e                   | dec                 esi

        $sequence_7 = { 33d2 895008 8b45f8 c6401000 6a40 6800100000 8b8510ffffff }
            // n = 7, score = 700
            //   33d2                 | xor                 edx, edx
            //   895008               | mov                 dword ptr [eax + 8], edx
            //   8b45f8               | mov                 eax, dword ptr [ebp - 8]
            //   c6401000             | mov                 byte ptr [eax + 0x10], 0
            //   6a40                 | push                0x40
            //   6800100000           | push                0x1000
            //   8b8510ffffff         | mov                 eax, dword ptr [ebp - 0xf0]

        $sequence_8 = { eb7a 8b45f4 8b4010 03c6 8bd8 }
            // n = 5, score = 700
            //   eb7a                 | jmp                 0x7c
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   8b4010               | mov                 eax, dword ptr [eax + 0x10]
            //   03c6                 | add                 eax, esi
            //   8bd8                 | mov                 ebx, eax

        $sequence_9 = { 50 e8???????? 297308 ff45fc ff4df8 75da }
            // n = 6, score = 700
            //   50                   | push                eax
            //   e8????????           |                     
            //   297308               | sub                 dword ptr [ebx + 8], esi
            //   ff45fc               | inc                 dword ptr [ebp - 4]
            //   ff4df8               | dec                 dword ptr [ebp - 8]
            //   75da                 | jne                 0xffffffdc

    condition:
        7 of them and filesize < 9191424
}
[TLP:WHITE] win_cybergate_w0   (20170517 | No description)
/*
    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as
    long as you use it under this license.
*/
rule win_cybergate_w0 {

	meta:
		author = " Kevin Breen <kevin@techanarchy.net>"
		contributors = "Daniel Plohmann"
		date = "2014/04"
		ref = "http://malwareconfig.com/stats/CyberGate"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.cybergate"
        malpedia_version = "20170517"
        malpedia_license = "GNU-GPLv2"
        malpedia_sharing = "TLP:WHITE"

	strings:
		$string1 = {23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23}
		$string2 = {23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23}
		$string3 = "EditSvr"
		$string4 = "TLoader"
		$string5 = "Stroks"
		$string6 = "####@####"
		$res1 = "XX-XX-XX-XX"
		$res2 = "CG-CG-CG-CG"
		
		$command_0 = "limpasclipboard"
		$command_1 = "shellativar"
		$command_2 = "configuracoesdoserver"
		$command_3 = "finalizarconexao"

	condition:
		(all of ($string*) or any of ($res*)) or (all of ($command_*))
}
Download all Yara Rules