General

  • Target

    4a5eb47947f04f9c8479be0879491a0f_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240715-tdwr8sybmp

  • MD5

    4a5eb47947f04f9c8479be0879491a0f

  • SHA1

    53656fb0bbebd2f1b766cdddfc9289eed443f821

  • SHA256

    295eba38b95f09083f2673594bdcba73985d5b89e41230b9c4761b584a68051f

  • SHA512

    166425cac93ee83b7ef90629e60d74a41e1eadeea06c0fffc993c58088b84c4afa6c467fd2c2014d4f19d5384917949809c7832417940823a8ff8f2f0a9167d0

  • SSDEEP

    24576:HhqMYdprgqE8sleQy2bkqjZcFMV3bLCHYvn/htX3t3Pf2:HhqDpJE3QOnjZy1HsfBG

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

itzh4cked

C2

itzh4cked.no-ip.biz:6661

Mutex

CY4GD3PW1Q0B43

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    test this bitch.exe

  • install_dir

    Windows

  • install_file

    chrome.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    what459sit512

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      4a5eb47947f04f9c8479be0879491a0f_JaffaCakes118

    • Size

      1.2MB

    • MD5

      4a5eb47947f04f9c8479be0879491a0f

    • SHA1

      53656fb0bbebd2f1b766cdddfc9289eed443f821

    • SHA256

      295eba38b95f09083f2673594bdcba73985d5b89e41230b9c4761b584a68051f

    • SHA512

      166425cac93ee83b7ef90629e60d74a41e1eadeea06c0fffc993c58088b84c4afa6c467fd2c2014d4f19d5384917949809c7832417940823a8ff8f2f0a9167d0

    • SSDEEP

      24576:HhqMYdprgqE8sleQy2bkqjZcFMV3bLCHYvn/htX3t3Pf2:HhqDpJE3QOnjZy1HsfBG

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks