General

  • Target

    3a19a24294174eceb2e8418e46b0adb9_JaffaCakes118

  • Size

    465KB

  • Sample

    240711-v5nflsxalp

  • MD5

    3a19a24294174eceb2e8418e46b0adb9

  • SHA1

    90c4ccf77b3d9e20c4c9d255b179b813db869408

  • SHA256

    14694f1f281ccca554167826f2c99a2ad79f8a4bcb111f37d8e86922d61800f1

  • SHA512

    b7452089b952eaa66db22b5b669a29a7e14421361ada1507aff6f4c5597e8f0656a1eb435a06e8eb2d8d99834421a998a947a273ce0b15853bbd22ef0e69af75

  • SSDEEP

    6144:l+p9442xlu+D0fQ5rqviJaXptmKmzO52xS4l+gXSmCgvdnmZ1z3U4l:lw9pAlDZQcaZdAO0xz+56vYZFU4l

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

Victim

C2

un-named.no-ip.info:4315

Mutex

6Y1DL4602V5U87

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    services

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Some files are missing or corrupt!

  • message_box_title

    Windows

  • password

    qqq

  • regkey_hkcu

    Ml_Updater

  • regkey_hklm

    MicrosoftXML

Targets

    • Target

      3a19a24294174eceb2e8418e46b0adb9_JaffaCakes118

    • Size

      465KB

    • MD5

      3a19a24294174eceb2e8418e46b0adb9

    • SHA1

      90c4ccf77b3d9e20c4c9d255b179b813db869408

    • SHA256

      14694f1f281ccca554167826f2c99a2ad79f8a4bcb111f37d8e86922d61800f1

    • SHA512

      b7452089b952eaa66db22b5b669a29a7e14421361ada1507aff6f4c5597e8f0656a1eb435a06e8eb2d8d99834421a998a947a273ce0b15853bbd22ef0e69af75

    • SSDEEP

      6144:l+p9442xlu+D0fQ5rqviJaXptmKmzO52xS4l+gXSmCgvdnmZ1z3U4l:lw9pAlDZQcaZdAO0xz+56vYZFU4l

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks