General

  • Target

    2544a9c35ad41c9dd02a3a9fcd8be08b_JaffaCakes118

  • Size

    544KB

  • Sample

    241008-zmpceaygnd

  • MD5

    2544a9c35ad41c9dd02a3a9fcd8be08b

  • SHA1

    d8a650084fb55eab848d1feb419e3794b35904ad

  • SHA256

    0a2b5600655346708b778ecbf3f1bd47482874dfcf975cd568132f620574b862

  • SHA512

    e9fa9806f7729db89f58a602619839c422cd4897b0f2109adae3aebd1545865ae370081c6386029590e0c6c14f69871047701520d74ecd5c822d07124298efb7

  • SSDEEP

    12288:Ct8/SuHS24dAn+THPaIdVKDdN/aVSXmtBbiqW5XI:9tpsaIdqoSXmtj+

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

atpenisixd.no-ip.org:81

bedenim.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Targets

    • Target

      2544a9c35ad41c9dd02a3a9fcd8be08b_JaffaCakes118

    • Size

      544KB

    • MD5

      2544a9c35ad41c9dd02a3a9fcd8be08b

    • SHA1

      d8a650084fb55eab848d1feb419e3794b35904ad

    • SHA256

      0a2b5600655346708b778ecbf3f1bd47482874dfcf975cd568132f620574b862

    • SHA512

      e9fa9806f7729db89f58a602619839c422cd4897b0f2109adae3aebd1545865ae370081c6386029590e0c6c14f69871047701520d74ecd5c822d07124298efb7

    • SSDEEP

      12288:Ct8/SuHS24dAn+THPaIdVKDdN/aVSXmtBbiqW5XI:9tpsaIdqoSXmtj+

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks