General

  • Target

    31fb64a31bda2cf2492d814065bcf2af_JaffaCakes118

  • Size

    292KB

  • Sample

    240709-zy9sgsxerd

  • MD5

    31fb64a31bda2cf2492d814065bcf2af

  • SHA1

    d98b24d3ada94257540bde85a020d5159228eed8

  • SHA256

    d7633d00d218123fdfb2fb067b27a0e75feea3572cf503cae1719fc21279a46e

  • SHA512

    9a87c24afedf8dbbf776a9b1fefbb72e4873de34da08d99d6e639d82f8340e3d0c6775a6e6d896dc68150c44ae9c5111414207e9f52367ac7e402d92096d4f6f

  • SSDEEP

    6144:qQwT8/q3c66q8WRv6pZYfCEyr76riMJILWawPo5v1pWp3WzkBt1vQ:q+S3c65ypfEyrQ9JFohGWAY

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

spy

C2

jurizaran0ff.zapto.org:2050

Mutex

AOKD53MHSR13E6

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    dll

  • install_file

    con32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_title

    CyberGate

  • password

    ficken123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Extracted

Family

latentbot

C2

jurizaran0ff.zapto.org

Targets

    • Target

      31fb64a31bda2cf2492d814065bcf2af_JaffaCakes118

    • Size

      292KB

    • MD5

      31fb64a31bda2cf2492d814065bcf2af

    • SHA1

      d98b24d3ada94257540bde85a020d5159228eed8

    • SHA256

      d7633d00d218123fdfb2fb067b27a0e75feea3572cf503cae1719fc21279a46e

    • SHA512

      9a87c24afedf8dbbf776a9b1fefbb72e4873de34da08d99d6e639d82f8340e3d0c6775a6e6d896dc68150c44ae9c5111414207e9f52367ac7e402d92096d4f6f

    • SSDEEP

      6144:qQwT8/q3c66q8WRv6pZYfCEyr76riMJILWawPo5v1pWp3WzkBt1vQ:q+S3c65ypfEyrQ9JFohGWAY

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks