Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a6a1f8bb2df3904b4c7691993c67c910_JaffaCakes118

  • Size

    296KB

  • Sample

    240818-nsmvzssbpg

  • MD5

    a6a1f8bb2df3904b4c7691993c67c910

  • SHA1

    b25fec75fc82974295d37d0223a5277535ada64a

  • SHA256

    3dcbbc520467c8e447e3d9fc1edb788178cd5efbe82ee2fc47c5666193127746

  • SHA512

    b1178d10cad6c2917a9adeb218de64a20ef5eedfe4711f165f936a2477066c5c96d3be6b6da221326bf729d8902a91f55f00cc93e7a5e980a957068dc1b3d0b0

  • SSDEEP

    6144:POpslFlqDhdBCkWYxuukP1pjSKSNVkq/MVJbC:PwsluTBd47GLRMTbC

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

jacksonjonesjunior.zapto.org:780

Mutex

OMB4I1884AL8VP

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    %System%

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    lol999

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Extracted

Family

latentbot

C2

jacksonjonesjunior.zapto.org

Targets

    • Target

      a6a1f8bb2df3904b4c7691993c67c910_JaffaCakes118

    • Size

      296KB

    • MD5

      a6a1f8bb2df3904b4c7691993c67c910

    • SHA1

      b25fec75fc82974295d37d0223a5277535ada64a

    • SHA256

      3dcbbc520467c8e447e3d9fc1edb788178cd5efbe82ee2fc47c5666193127746

    • SHA512

      b1178d10cad6c2917a9adeb218de64a20ef5eedfe4711f165f936a2477066c5c96d3be6b6da221326bf729d8902a91f55f00cc93e7a5e980a957068dc1b3d0b0

    • SSDEEP

      6144:POpslFlqDhdBCkWYxuukP1pjSKSNVkq/MVJbC:PwsluTBd47GLRMTbC

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.