General

  • Target

    4ea607955030ff091995eb2af2d62c86_JaffaCakes118

  • Size

    689KB

  • Sample

    240716-rd7hmawepp

  • MD5

    4ea607955030ff091995eb2af2d62c86

  • SHA1

    d32bb47c6fb6f4c869ec228348af39dd29a4b3d3

  • SHA256

    7213b567db4a5c10ef272cfa608a272bc167e222f64268d419a532a2ee2e8c13

  • SHA512

    2a9f53e0c492361c69b822da835b1eb024615d892ad7cfd16f9a7c3e0d28d6f5fe498acded6857b480219c5d590aaff07889da50e0d186d5f4fafc7f8b8c0670

  • SSDEEP

    12288:v2kXrpC1OCPvAX9wTkktruUKYUlrCi/z6m0jWwdi3ay6yjNLsBaGM:L741OqvAX9wTKUKJCWEikioy5IBah

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

test

C2

test41.no-ip.org:5656

test41.no-ip.biz:5656

Mutex

D7FJ028211VSP0

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    system32

  • install_file

    data.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    Arschloch2800

  • regkey_hkcu

    windows defender

  • regkey_hklm

    windows defender

Targets

    • Target

      4ea607955030ff091995eb2af2d62c86_JaffaCakes118

    • Size

      689KB

    • MD5

      4ea607955030ff091995eb2af2d62c86

    • SHA1

      d32bb47c6fb6f4c869ec228348af39dd29a4b3d3

    • SHA256

      7213b567db4a5c10ef272cfa608a272bc167e222f64268d419a532a2ee2e8c13

    • SHA512

      2a9f53e0c492361c69b822da835b1eb024615d892ad7cfd16f9a7c3e0d28d6f5fe498acded6857b480219c5d590aaff07889da50e0d186d5f4fafc7f8b8c0670

    • SSDEEP

      12288:v2kXrpC1OCPvAX9wTkktruUKYUlrCi/z6m0jWwdi3ay6yjNLsBaGM:L741OqvAX9wTKUKJCWEikioy5IBah

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

3
T1112

Tasks