General

  • Target

    dc7892eaf691b66491db2b5294cc60d9_JaffaCakes118

  • Size

    400KB

  • Sample

    240912-sdadkazfrb

  • MD5

    dc7892eaf691b66491db2b5294cc60d9

  • SHA1

    fd81a682b5f17ad635f92ea717e617575fb5870f

  • SHA256

    5308791250809147ca065a0dc77aa2b028cbd658c271504a6642e58e81dbd122

  • SHA512

    a4753981704afac4700592589f696bae10099ddc5336274bc9b8283bb87a4be9fd27eb2a0815d449d6927f1e94fa3f8fce51f015c405524e06c415b72f61ddcf

  • SSDEEP

    6144:0eVNrontepoUj55JTZ9KoB+Kbx9aoYywZTNzmAg6poYH/t3I4c6a6pLo/eCoIeUB:sGTZ9p5b7NHGTsH6poYV3zG//o7UB

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    Win_Xp.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please try again later.

  • message_box_title

    Error

  • password

    virusa

Targets

    • Target

      dc7892eaf691b66491db2b5294cc60d9_JaffaCakes118

    • Size

      400KB

    • MD5

      dc7892eaf691b66491db2b5294cc60d9

    • SHA1

      fd81a682b5f17ad635f92ea717e617575fb5870f

    • SHA256

      5308791250809147ca065a0dc77aa2b028cbd658c271504a6642e58e81dbd122

    • SHA512

      a4753981704afac4700592589f696bae10099ddc5336274bc9b8283bb87a4be9fd27eb2a0815d449d6927f1e94fa3f8fce51f015c405524e06c415b72f61ddcf

    • SSDEEP

      6144:0eVNrontepoUj55JTZ9KoB+Kbx9aoYywZTNzmAg6poYH/t3I4c6a6pLo/eCoIeUB:sGTZ9p5b7NHGTsH6poYV3zG//o7UB

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks