user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Win32/Cycbot.B
Backdoor:Win32/Cycbot.B - Windows Defender threat signature analysis

Backdoor:Win32/Cycbot.B - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Win32/Cycbot.B
Classification:
Type:Backdoor
Platform:Win32
Family:Cycbot
Detection Type:Concrete
Known malware family with identified signatures
Variant:B
Specific signature variant within the malware family
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for 32-bit Windows platform, family Cycbot

Summary:

Backdoor:Win32/Cycbot.B is a sophisticated backdoor that establishes remote control over a compromised Windows system. It communicates with a command-and-control server to exfiltrate system information, including security software details, and execute arbitrary commands, posing a critical security risk.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - /gbot/t.php?q=%s (PEHSTR_EXT)
 - /cgi-bin/cycle_report (PEHSTR_EXT)
 - %s/gbot/sc.cgi?id=%s&c=%d (PEHSTR_EXT)
 - stor.cfg (PEHSTR_EXT)
 - User-Agent: gbot/ (PEHSTR_EXT)
 - User-Agent: iamx/ (PEHSTR_EXT)
 - _NUMBERN (PEHSTR_EXT)
 - images/im133.jpg (PEHSTR_EXT)
 - images/3521.jpg (PEHSTR_EXT)
 - /g/t.php?q=%s (PEHSTR_EXT)
 - \gb_%d.bat (PEHSTR_EXT)
 - QZv/1* (SNID)
YARA Rule:
rule Backdoor_Win32_Cycbot_B_2147789622_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Win32/Cycbot.B"
        threat_id = "2147789622"
        type = "Backdoor"
        platform = "Win32: Windows 32-bit platform"
        family = "Cycbot"
        severity = "Critical"
        signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
        threshold = "5"
        strings_accuracy = "Low"
    strings:
        $x_2_1 = "/gbot/t.php?q=%s" ascii //weight: 2
        $x_2_2 = "type=%s&system=%s&id=%s&status=%s" ascii //weight: 2
        $x_2_3 = {2f 63 67 69 2d 62 69 6e 2f 63 79 63 6c 65 5f 72 65 70 6f 72 74 [0-2] 2e 63 67 69}  //weight: 2, accuracy: Low
        $x_2_4 = "%s/gbot/sc.cgi?id=%s&c=%d" ascii //weight: 2
        $x_1_5 = "PING_LS_TM_%d" ascii //weight: 1
        $x_1_6 = {73 74 6f 72 2e 63 66 67 00}  //weight: 1, accuracy: High
        $x_1_7 = "_LAST_TIME_FAIL_CONNECT_MAIN_SERVER" ascii //weight: 1
        $x_1_8 = "SEND_INSTALL_REPORT" ascii //weight: 1
        $x_2_9 = "User-Agent: gbot/" ascii //weight: 2
        $x_2_10 = "User-Agent: iamx/" ascii //weight: 2
        $x_2_11 = "id=%s&hwid=%s&c=%d&ver=" ascii //weight: 2
        $x_1_12 = {50 41 52 41 4d 5f 50 52 4f 58 59 5f 50 4f 52 54 (5f 4e 55 4d 42|4e)}  //weight: 1, accuracy: Low
        $x_1_13 = "images/im133.jpg" ascii //weight: 1
        $x_1_14 = "images/3521.jpg" ascii //weight: 1
        $x_2_15 = {2f 67 2f 74 2e 70 68 70 3f 71 3d 25 73 00}  //weight: 2, accuracy: High
        $x_1_16 = "hwid=%s&id=%s" ascii //weight: 1
        $x_1_17 = "&wd=%d&av=%s" ascii //weight: 1
        $x_1_18 = {49 4e 53 54 5f 52 45 50 4f 52 54 5f 54 4d 00}  //weight: 1, accuracy: High
        $x_1_19 = {4c 53 5f 50 49 4e 47 5f 54 4d 00}  //weight: 1, accuracy: High
        $x_2_20 = {68 77 69 64 3d 25 73 26 63 3d 25 64 26 ?? ?? ?? 3d 30 26 76 65 72 3d}  //weight: 2, accuracy: Low
        $x_1_21 = "t=%s&hrs=%d&q=%s&s=%d" ascii //weight: 1
        $x_3_22 = {43 81 fb d0 07 00 00 72 e7 eb ?? 81 7c 24 0c dc 05 00 00 73 06 ff 44 24 0c eb ?? 50 e8}  //weight: 3, accuracy: Low
        $x_2_23 = {50 41 52 41 4d 5f 4c 49 53 54 45 4e 5f 50 4f 52 54 00}  //weight: 2, accuracy: High
        $x_1_24 = {5c 67 62 5f 25 64 2e 62 61 74 00}  //weight: 1, accuracy: High
        $x_2_25 = {8b 45 f4 80 7d ff 06 fe 45 ff 8d 34 02 8a 06 72 04 c6 45 ff 01 0f b6 4d ff d2 c0 42 88 06 3b 55 f8 72 dd}  //weight: 2, accuracy: High
        $x_3_26 = {99 b9 2c 01 00 00 f7 f9 (8b fb 8b f2|89 9d ?? ?? ff ff 8b fa) c8 00 00 00 74 ?? e8 ?? ?? ?? ?? 25 3f 00 00 80 79}  //weight: 3, accuracy: Low
        $x_3_27 = {b8 28 01 00 00 39 06 75 ?? 8b 4d ?? 3b cb 74 08 3b 8e 08 01 00 00 75 ?? 8b 8d ?? ?? ff ff 3b cb 74 08 8b 96 0c 01 00 00 89 11 39 5d ?? 75}  //weight: 3, accuracy: Low
    condition:
        (filesize < 20MB) and
        (
            ((5 of ($x_1_*))) or
            ((1 of ($x_2_*) and 3 of ($x_1_*))) or
            ((2 of ($x_2_*) and 1 of ($x_1_*))) or
            ((3 of ($x_2_*))) or
            ((1 of ($x_3_*) and 2 of ($x_1_*))) or
            ((1 of ($x_3_*) and 1 of ($x_2_*))) or
            ((2 of ($x_3_*))) or
            (all of ($x*))
        )
}
Known malware which is associated with this threat:
bfe53a0250e212f6bd1bc1493dd6a0eb622a1ac260e8e69c51f48f4d9b71106d
22/03/2026
Remediation Steps:
Immediately isolate the infected system from the network. Perform a full system scan with an updated anti-malware solution like Windows Defender, ensuring the threat is quarantined and removed. Investigate for persistence mechanisms, lateral movement, and reset any compromised user credentials.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 22/03/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$