General

  • Target

    c1104e1897084aca6db4e0ff84ec2a8e_JaffaCakes118

  • Size

    337KB

  • Sample

    240825-s74jhasakb

  • MD5

    c1104e1897084aca6db4e0ff84ec2a8e

  • SHA1

    6e9892a4a83ad2bf76fdc58df772a6ed67c6f050

  • SHA256

    2acfd5a30ab557fd9f4ab12f52e48324544ad681e568bc98b8ff0e45ffa4e3c7

  • SHA512

    d88d3809c3634012ab904cef7c4b4c48d5942133cc4c8b74c368b7ff9af093e38ae7399ff9a5142c4475d1187ae281b7a508e84c293fa4ee9894a4cf8b5a8c16

  • SSDEEP

    6144:puS5brEdkhr1RPviaXxvE6+p8J898zs6J7oq6y72Wgu8MwUX7:ppgdyw6X89wJ7Rp8Mz

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

opfer

C2

helokittybizzy.no-ip.biz:512

Mutex

T2FA85DFB31H1U

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1234

Targets

    • Target

      c1104e1897084aca6db4e0ff84ec2a8e_JaffaCakes118

    • Size

      337KB

    • MD5

      c1104e1897084aca6db4e0ff84ec2a8e

    • SHA1

      6e9892a4a83ad2bf76fdc58df772a6ed67c6f050

    • SHA256

      2acfd5a30ab557fd9f4ab12f52e48324544ad681e568bc98b8ff0e45ffa4e3c7

    • SHA512

      d88d3809c3634012ab904cef7c4b4c48d5942133cc4c8b74c368b7ff9af093e38ae7399ff9a5142c4475d1187ae281b7a508e84c293fa4ee9894a4cf8b5a8c16

    • SSDEEP

      6144:puS5brEdkhr1RPviaXxvE6+p8J898zs6J7oq6y72Wgu8MwUX7:ppgdyw6X89wJ7Rp8Mz

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks