General

  • Target

    51decfb0bab366d1b70c2720c8cffe8e_JaffaCakes118

  • Size

    595KB

  • Sample

    240717-hf7rqszbnk

  • MD5

    51decfb0bab366d1b70c2720c8cffe8e

  • SHA1

    a90e5e76e189471b7bf035360f456d16fb55b1ee

  • SHA256

    e81b648fc6883def18ca745595fb87fcd7de19c719254fe2fbfa3bf91300419d

  • SHA512

    9b83831a12538e4fd2fd0c1e429affd99588d5ac9ba9376e8f5fb95ff4cc98d6f607432fd73b3d44b093796376bd1cbc63e6abcf6170f2506a2d8bd47b04d381

  • SSDEEP

    12288:geDeE+kNlm6127eCM1lgQxEgP8JnK4k23ugpON1rf3srPReso:H6DIm618M1ls/K4l32lf3sr8

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    Win_Xp.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please try again later.

  • message_box_title

    Error

  • password

    abcd1234

Targets

    • Target

      51decfb0bab366d1b70c2720c8cffe8e_JaffaCakes118

    • Size

      595KB

    • MD5

      51decfb0bab366d1b70c2720c8cffe8e

    • SHA1

      a90e5e76e189471b7bf035360f456d16fb55b1ee

    • SHA256

      e81b648fc6883def18ca745595fb87fcd7de19c719254fe2fbfa3bf91300419d

    • SHA512

      9b83831a12538e4fd2fd0c1e429affd99588d5ac9ba9376e8f5fb95ff4cc98d6f607432fd73b3d44b093796376bd1cbc63e6abcf6170f2506a2d8bd47b04d381

    • SSDEEP

      12288:geDeE+kNlm6127eCM1lgQxEgP8JnK4k23ugpON1rf3srPReso:H6DIm618M1ls/K4l32lf3sr8

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • UAC bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Tasks