General

  • Target

    97c2579d4d64d3250664b1e3842a1f92_JaffaCakes118

  • Size

    547KB

  • Sample

    240814-1eznva1bln

  • MD5

    97c2579d4d64d3250664b1e3842a1f92

  • SHA1

    bf62d57bcded52e3190c210fd034f5dae383e58c

  • SHA256

    e074320678c5242d5b7ecbd96015ad50a41a22b201966bdfdba36061ee06203e

  • SHA512

    abd03dd8154ec6b698c9729dd1aeaab36a96982b572c44d518b04f7e08a635641137495e638c4468c72cc6a359c9389a3391b60810a1e894c06923014ea7b21f

  • SSDEEP

    12288:ZkSccZ/bEw+28hFxjQPlrBCk5M0toZIV5xT8uqFzIMgypD9hyAfD0te:lcgbAjQPfCkUZULtqyw0Q

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

afflictionrat2.zapto.org:95

Mutex

T4AY57D12L5AN2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Adobe

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    getrocked

Extracted

Family

latentbot

C2

afflictionrat2.zapto.org

Targets

    • Target

      97c2579d4d64d3250664b1e3842a1f92_JaffaCakes118

    • Size

      547KB

    • MD5

      97c2579d4d64d3250664b1e3842a1f92

    • SHA1

      bf62d57bcded52e3190c210fd034f5dae383e58c

    • SHA256

      e074320678c5242d5b7ecbd96015ad50a41a22b201966bdfdba36061ee06203e

    • SHA512

      abd03dd8154ec6b698c9729dd1aeaab36a96982b572c44d518b04f7e08a635641137495e638c4468c72cc6a359c9389a3391b60810a1e894c06923014ea7b21f

    • SSDEEP

      12288:ZkSccZ/bEw+28hFxjQPlrBCk5M0toZIV5xT8uqFzIMgypD9hyAfD0te:lcgbAjQPfCkUZULtqyw0Q

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks