General

  • Target

    7c8b6104389a5f84f5c1f05ac261186e_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241029-yfs7caznen

  • MD5

    7c8b6104389a5f84f5c1f05ac261186e

  • SHA1

    ba03219af2e191180ae699c6c9050aadf43025e5

  • SHA256

    7846985695b70ba9e314cb98b143a3e31e53445853837b6c4864e7d3ed6f9eba

  • SHA512

    a52dce1676cc8942848016a2b8980a1f279e1bd64f4fc8608054016d5abd7f7e3d0566239358dfbf464871a4e016bde1e71cb2c9e194aad9926c92684a7d3e79

  • SSDEEP

    24576:9kodSyxubU28Eu74VKw+rj1vdFFQ6FNaY/ukmuhmHJniK90LP8sj:9k/70EuUMPj11FFQ6FNaE9muhmtiK905

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

1865patch

C2

sharpn3ss.no-ip.org:81

Mutex

safgfhfhgfn5423532

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    10

  • ftp_password

    841661tr

  • ftp_port

    21

  • ftp_server

    sharpn_798792.sh.funpic.org

  • ftp_username

    sharpn_798792

  • injected_process

    explorer.exe

  • install_dir

    SYSTEM

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    You must use the Role Management Tool to insttal or configure Microsoft.NET Framework 3.5

  • message_box_title

    Microsoft.NET Framework 3.5

  • password

    abcd1234

Targets

    • Target

      7c8b6104389a5f84f5c1f05ac261186e_JaffaCakes118

    • Size

      1.1MB

    • MD5

      7c8b6104389a5f84f5c1f05ac261186e

    • SHA1

      ba03219af2e191180ae699c6c9050aadf43025e5

    • SHA256

      7846985695b70ba9e314cb98b143a3e31e53445853837b6c4864e7d3ed6f9eba

    • SHA512

      a52dce1676cc8942848016a2b8980a1f279e1bd64f4fc8608054016d5abd7f7e3d0566239358dfbf464871a4e016bde1e71cb2c9e194aad9926c92684a7d3e79

    • SSDEEP

      24576:9kodSyxubU28Eu74VKw+rj1vdFFQ6FNaY/ukmuhmHJniK90LP8sj:9k/70EuUMPj11FFQ6FNaE9muhmtiK905

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks