General

  • Target

    0660dcf4d2d543f38bbaa6fbf4ce4c53_JaffaCakes118

  • Size

    926KB

  • Sample

    241001-s4kxzs1dlb

  • MD5

    0660dcf4d2d543f38bbaa6fbf4ce4c53

  • SHA1

    69ac9e71a5279c3ead24dfeaa6f1e0f55b966ab3

  • SHA256

    c6d2f95dd6643ecf5fe8ddd09f1713e5c9772d92e5aaab5b211aa617b12cc0f4

  • SHA512

    7000c367d5b10accd02b7c9a5402067fb04a5db14ef41f6abd78748bcfe47081a9891d95a3ddf550a8fcc852ca3357f74d5714b541e1fb4b8e6977d8048c7c1e

  • SSDEEP

    24576:xu4E7acqSqTAflGWHMZXfo+lhbhx+Xx+XZhbIzH:xfaacqvEN9MRo+lfcXcpKb

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 02

Botnet

vítima

C2

emtiaz.sytes.net:7000

Mutex

***MUTEEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    explere

  • install_file

    explere.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    rhonam

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      0660dcf4d2d543f38bbaa6fbf4ce4c53_JaffaCakes118

    • Size

      926KB

    • MD5

      0660dcf4d2d543f38bbaa6fbf4ce4c53

    • SHA1

      69ac9e71a5279c3ead24dfeaa6f1e0f55b966ab3

    • SHA256

      c6d2f95dd6643ecf5fe8ddd09f1713e5c9772d92e5aaab5b211aa617b12cc0f4

    • SHA512

      7000c367d5b10accd02b7c9a5402067fb04a5db14ef41f6abd78748bcfe47081a9891d95a3ddf550a8fcc852ca3357f74d5714b541e1fb4b8e6977d8048c7c1e

    • SSDEEP

      24576:xu4E7acqSqTAflGWHMZXfo+lhbhx+Xx+XZhbIzH:xfaacqvEN9MRo+lfcXcpKb

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks