General

  • Target

    0de24466a5b1984f5728658c664df4a8_JaffaCakes118

  • Size

    322KB

  • Sample

    241003-ew6mtsxgre

  • MD5

    0de24466a5b1984f5728658c664df4a8

  • SHA1

    1119de1f624fcda7375b3bab451cd57cf45da2a7

  • SHA256

    e9ebab9a42077f8d1564eb832fb9f0ba9119ca6008fad3159dc580964087a238

  • SHA512

    07b916cc17257f75e7e00b7ac10e2b2650b07e0094a903d7a6192569cc9068518f61c04f4769bb6a42a692320bdce4d3f98cbf5e69288bbecbf7a4cb046d95bf

  • SSDEEP

    6144:ClKCb8KgFXi7aVPhsHMwq2VWU/5kWjRJHbBYseP4fJpS9snJ4rbDMf1u:JCbDgFXrvwq2VWS9YuJp5n+DOu

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

524

C2

81.64.255.138:524

skylabinc.zapto.org:524

Mutex

56Y6UBJB6L76BQ

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    lolilol

  • regkey_hkcu

    svchost

  • regkey_hklm

    svchost

Targets

    • Target

      0de24466a5b1984f5728658c664df4a8_JaffaCakes118

    • Size

      322KB

    • MD5

      0de24466a5b1984f5728658c664df4a8

    • SHA1

      1119de1f624fcda7375b3bab451cd57cf45da2a7

    • SHA256

      e9ebab9a42077f8d1564eb832fb9f0ba9119ca6008fad3159dc580964087a238

    • SHA512

      07b916cc17257f75e7e00b7ac10e2b2650b07e0094a903d7a6192569cc9068518f61c04f4769bb6a42a692320bdce4d3f98cbf5e69288bbecbf7a4cb046d95bf

    • SSDEEP

      6144:ClKCb8KgFXi7aVPhsHMwq2VWU/5kWjRJHbBYseP4fJpS9snJ4rbDMf1u:JCbDgFXrvwq2VWS9YuJp5n+DOu

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks