General

  • Target

    1827f0740daed91accce0e3fed95cc72_JaffaCakes118

  • Size

    724KB

  • Sample

    241006-p3v5savcmm

  • MD5

    1827f0740daed91accce0e3fed95cc72

  • SHA1

    3fca5cdc259ad7098b00392d75148dea2bf7382b

  • SHA256

    bdfd1f3cb54a3892d5d35f1a69c1952e2fc1578415bb9444e66e2c5d5759b0a8

  • SHA512

    1a606d008c2579a455647a5909cc9f80eec19b0c90c0e44d4fffa824a1cb2ebb12c7f09d130b17da3c05e347d7e11915159db2f683ce6e1ab2daffa75a43fa6b

  • SSDEEP

    12288:nF3A1nJJjdpuw6u1TiEoZEaBGg7IZfJRJFJbbWFh7ojNH4QQniPse4:nVAD9df6uJQEcleJNYQGi0j

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

alevkaya.zapto.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    anan

  • message_box_title

    anan

  • password

    abcd1234

Targets

    • Target

      1827f0740daed91accce0e3fed95cc72_JaffaCakes118

    • Size

      724KB

    • MD5

      1827f0740daed91accce0e3fed95cc72

    • SHA1

      3fca5cdc259ad7098b00392d75148dea2bf7382b

    • SHA256

      bdfd1f3cb54a3892d5d35f1a69c1952e2fc1578415bb9444e66e2c5d5759b0a8

    • SHA512

      1a606d008c2579a455647a5909cc9f80eec19b0c90c0e44d4fffa824a1cb2ebb12c7f09d130b17da3c05e347d7e11915159db2f683ce6e1ab2daffa75a43fa6b

    • SSDEEP

      12288:nF3A1nJJjdpuw6u1TiEoZEaBGg7IZfJRJFJbbWFh7ojNH4QQniPse4:nVAD9df6uJQEcleJNYQGi0j

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks