General

  • Target

    8fc4cffd24d2aa20ee97b7497c65073c_JaffaCakes118

  • Size

    549KB

  • Sample

    240812-wvml1asgqm

  • MD5

    8fc4cffd24d2aa20ee97b7497c65073c

  • SHA1

    165f6bfb6e73f5b700e13f215004549338f07ec0

  • SHA256

    a82a5cc078a91145fe0567a54b2d74173f9b50b3f4622c09e85b28c5703e1a83

  • SHA512

    fb8cc9acca9cf5df102470003bcb7989d5f11642f8a50eed561f61ca342fedf38dc0251368729fef65d42aebd7b24acaa01d48d97d95d973a2c4fe1b77b141a5

  • SSDEEP

    12288:7qgXWwmwZM1OnatFmj5d6RA6Q1pZ+R67LUoFY6GByo0bLk/7lQ0cl:mgXn67aYai37K

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

afflictionrat2.zapto.org:95

Mutex

T4AY57D12L5AN2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Adobe

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    getrocked

Extracted

Family

latentbot

C2

afflictionrat2.zapto.org

Targets

    • Target

      8fc4cffd24d2aa20ee97b7497c65073c_JaffaCakes118

    • Size

      549KB

    • MD5

      8fc4cffd24d2aa20ee97b7497c65073c

    • SHA1

      165f6bfb6e73f5b700e13f215004549338f07ec0

    • SHA256

      a82a5cc078a91145fe0567a54b2d74173f9b50b3f4622c09e85b28c5703e1a83

    • SHA512

      fb8cc9acca9cf5df102470003bcb7989d5f11642f8a50eed561f61ca342fedf38dc0251368729fef65d42aebd7b24acaa01d48d97d95d973a2c4fe1b77b141a5

    • SSDEEP

      12288:7qgXWwmwZM1OnatFmj5d6RA6Q1pZ+R67LUoFY6GByo0bLk/7lQ0cl:mgXn67aYai37K

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks