General

  • Target

    baa4075cc7ab86a8adc269c24049c6b5_JaffaCakes118

  • Size

    435KB

  • Sample

    240823-gt1pxa1drj

  • MD5

    baa4075cc7ab86a8adc269c24049c6b5

  • SHA1

    716f256342eea04dfb35a68d2997729e0deb338e

  • SHA256

    39b5a0777f2a9d7b5966ff06c43797dec4ff4a09ddb6250fd7123340aa48d32d

  • SHA512

    7205f51d05c99bbb8012fa359af9fde56a3c7e074273eb0a398921828725aa4d532fcb16dcba04ef231a657d6be37dd121daef5027a34c3918a32072b0948979

  • SSDEEP

    12288:8rMNcsSx98xEk+FgjUFfEUpDcZiCrMMTBb7:8rMxESEPFgYhEoDarMM57

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

1997.bounceme.net:6002

Mutex

***MNOINM***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    ctfmon.exe

  • install_file

    ctfmonnos.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    JJHHJJ

  • regkey_hklm

    JJHHJJ

Targets

    • Target

      baa4075cc7ab86a8adc269c24049c6b5_JaffaCakes118

    • Size

      435KB

    • MD5

      baa4075cc7ab86a8adc269c24049c6b5

    • SHA1

      716f256342eea04dfb35a68d2997729e0deb338e

    • SHA256

      39b5a0777f2a9d7b5966ff06c43797dec4ff4a09ddb6250fd7123340aa48d32d

    • SHA512

      7205f51d05c99bbb8012fa359af9fde56a3c7e074273eb0a398921828725aa4d532fcb16dcba04ef231a657d6be37dd121daef5027a34c3918a32072b0948979

    • SSDEEP

      12288:8rMNcsSx98xEk+FgjUFfEUpDcZiCrMMTBb7:8rMxESEPFgYhEoDarMM57

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks