General

  • Target

    ecc46761438e3e9f505ad9040f25d044_JaffaCakes118

  • Size

    808KB

  • Sample

    240920-d6sy2sxbkp

  • MD5

    ecc46761438e3e9f505ad9040f25d044

  • SHA1

    7821a0466d691983ac6c305081da96555b3bd8a0

  • SHA256

    2792c2eb1ae66c98e0875dbd826aca8a2668f4a7bba191a429b33392c4064a50

  • SHA512

    78a91121dd35b010e1ff8a5cfd4cfe8163d2e2ba2bdf50d2158d9e5b6ea858ddbd3ca6b2c9dfdfcc18d340c280a5fdfe7df393dd3e5106ae9f76df3a441f923b

  • SSDEEP

    24576:MXElfD243Tsu2ICqPIF1fTS/L6lg4lg7L:MUlfD243TsYCqPIrToAHy

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

tunisia4ever.zapto.org:6000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    Update33.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    Update2012

  • regkey_hklm

    Web

Extracted

Family

latentbot

C2

tunisia4ever.zapto.org

Targets

    • Target

      ecc46761438e3e9f505ad9040f25d044_JaffaCakes118

    • Size

      808KB

    • MD5

      ecc46761438e3e9f505ad9040f25d044

    • SHA1

      7821a0466d691983ac6c305081da96555b3bd8a0

    • SHA256

      2792c2eb1ae66c98e0875dbd826aca8a2668f4a7bba191a429b33392c4064a50

    • SHA512

      78a91121dd35b010e1ff8a5cfd4cfe8163d2e2ba2bdf50d2158d9e5b6ea858ddbd3ca6b2c9dfdfcc18d340c280a5fdfe7df393dd3e5106ae9f76df3a441f923b

    • SSDEEP

      24576:MXElfD243Tsu2ICqPIF1fTS/L6lg4lg7L:MUlfD243TsYCqPIrToAHy

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.