General

  • Target

    87f8ec318ff693fffd1a594f788dfb98_JaffaCakes118

  • Size

    677KB

  • Sample

    241102-1rmj2sxajm

  • MD5

    87f8ec318ff693fffd1a594f788dfb98

  • SHA1

    d02acda2bdad26693cf7148a4b72787c386595c3

  • SHA256

    b89cd5b01acd8718f2c71c08b41961fb7e0fa5a012e8008e8f8ff51bd4f8b4df

  • SHA512

    c142b9a00e0b287012d72d431cdd8d1076b710365c49bfced996cbcbf6e0f4c3e189c7347289cc047b3edfaa91ecf4d7b3fb7a190cd31f186e5e826647cacde5

  • SSDEEP

    12288:k6NHVDzz30+87HBX5dx+XqYJR9A5rRwL/pFVZMSjr9mNLnk6pHZfjapK5ooUw:k61VvzMtX5P+XxA5GFFVr9eXwKn

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

mateo135.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    winlogon.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    You Net Framework Version Is a Inestable Please Download the New Version of Microsoft Website http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5-b386f32c0992&displaylang=en

  • message_box_title

    Net Framework 4.0 Missing file

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      87f8ec318ff693fffd1a594f788dfb98_JaffaCakes118

    • Size

      677KB

    • MD5

      87f8ec318ff693fffd1a594f788dfb98

    • SHA1

      d02acda2bdad26693cf7148a4b72787c386595c3

    • SHA256

      b89cd5b01acd8718f2c71c08b41961fb7e0fa5a012e8008e8f8ff51bd4f8b4df

    • SHA512

      c142b9a00e0b287012d72d431cdd8d1076b710365c49bfced996cbcbf6e0f4c3e189c7347289cc047b3edfaa91ecf4d7b3fb7a190cd31f186e5e826647cacde5

    • SSDEEP

      12288:k6NHVDzz30+87HBX5dx+XqYJR9A5rRwL/pFVZMSjr9mNLnk6pHZfjapK5ooUw:k61VvzMtX5P+XxA5GFFVr9eXwKn

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks