General

  • Target

    91b7dbfe78fc06e6ece9b1d8657c46e2_JaffaCakes118

  • Size

    344KB

  • Sample

    240813-fnfbcavhla

  • MD5

    91b7dbfe78fc06e6ece9b1d8657c46e2

  • SHA1

    2a19e695f9cafd5268332304dde197adba48febe

  • SHA256

    8a86cf64c4c34fb397a3a723f38210b0bb4a38e380a90e11ece3db3c74871bcc

  • SHA512

    0d1cbf775a6f2135f8b0cf45240be10f135a586a138d89d5adb7832c19f95a6c517c5ff93b31be4dfb8f6aa17a654f39829a46865cb1813e82d0dfb4415fbf89

  • SSDEEP

    6144:1mcD66Rv5JGmrpQsK3RD2u270jupCJsCxCcIUmnMl:wcD66oZ2zkPaCxD

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Pesadilla

C2

humbertofox.zapto.org:8080

190.60.57.69:8080

Mutex

***Infeted***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    12345

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Extracted

Family

latentbot

C2

humbertofox.zapto.org

Targets

    • Target

      91b7dbfe78fc06e6ece9b1d8657c46e2_JaffaCakes118

    • Size

      344KB

    • MD5

      91b7dbfe78fc06e6ece9b1d8657c46e2

    • SHA1

      2a19e695f9cafd5268332304dde197adba48febe

    • SHA256

      8a86cf64c4c34fb397a3a723f38210b0bb4a38e380a90e11ece3db3c74871bcc

    • SHA512

      0d1cbf775a6f2135f8b0cf45240be10f135a586a138d89d5adb7832c19f95a6c517c5ff93b31be4dfb8f6aa17a654f39829a46865cb1813e82d0dfb4415fbf89

    • SSDEEP

      6144:1mcD66Rv5JGmrpQsK3RD2u270jupCJsCxCcIUmnMl:wcD66oZ2zkPaCxD

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks