General

  • Target

    2acc60dbb4fb386b692326a1a028c29b_JaffaCakes118

  • Size

    338KB

  • Sample

    241009-e2zrga1blg

  • MD5

    2acc60dbb4fb386b692326a1a028c29b

  • SHA1

    028fe705db2340e8d0cd2665ba6120941df86b62

  • SHA256

    e27f86c9cd68275ff9c9f747ce3fac7d825be5a4aaa270b1e0dfa93da753cad2

  • SHA512

    54b69c425ccc56299627cfd3c507eae8f92fd38507704f838d99f937574e8394f0ba1329a6f761772e5cb0b5512a66e523c26bfe33e9170b9d3c31d97b1d1615

  • SSDEEP

    6144:ZPBrzzzzzzzzt66Zt/o8439hY4QhcE3PVBVdAM9hjvEW9q0B374SO9Fn0Ka7sSNd:7zzzzzzzzt66Zt/r7CE3PVLHjvzVB3rH

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

test

C2

testgroundcha.zapto.org:100

Mutex

AINPIW1MDQ4C21

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

Extracted

Family

latentbot

C2

testgroundcha.zapto.org

Targets

    • Target

      2acc60dbb4fb386b692326a1a028c29b_JaffaCakes118

    • Size

      338KB

    • MD5

      2acc60dbb4fb386b692326a1a028c29b

    • SHA1

      028fe705db2340e8d0cd2665ba6120941df86b62

    • SHA256

      e27f86c9cd68275ff9c9f747ce3fac7d825be5a4aaa270b1e0dfa93da753cad2

    • SHA512

      54b69c425ccc56299627cfd3c507eae8f92fd38507704f838d99f937574e8394f0ba1329a6f761772e5cb0b5512a66e523c26bfe33e9170b9d3c31d97b1d1615

    • SSDEEP

      6144:ZPBrzzzzzzzzt66Zt/o8439hY4QhcE3PVBVdAM9hjvEW9q0B374SO9Fn0Ka7sSNd:7zzzzzzzzt66Zt/r7CE3PVLHjvzVB3rH

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks