General

  • Target

    866098d2c98285bdc77feb7b659f9ddd_JaffaCakes118

  • Size

    590KB

  • Sample

    241102-tty8aszbqm

  • MD5

    866098d2c98285bdc77feb7b659f9ddd

  • SHA1

    a71d4b520e4e5fa718c5b03d2d7589b37baccc63

  • SHA256

    d32a71ad2801fa5c6026d2dc37be492bd313b91822908ac1165a56f15580a685

  • SHA512

    a79af16d841ec6470ee6ef65cf622ea842680784f209430d7af79f2ea7b12736473bc9156453fbf309264be8d9f6e94318b9d1194a523374c051d27eea78241a

  • SSDEEP

    12288:a9rIBYkXWyShwxV7IcNu+qmWNQZH8QizPV8i6wAdvk:a9rMWyRu+qTYmN87wAd8

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

filmztube

C2

missmollymars.dyndns.org:82

togastand.zapto.org:82

difeng.getmyip.com:7777

Mutex

T8MCT3M72A5241

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    60

  • injected_process

    svchost.exe

  • install_dir

    System32

  • install_file

    dwm.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Please run as Admin

  • password

    ALCOHOL101

  • regkey_hkcu

    Policies

  • regkey_hklm

    Policies

Targets

    • Target

      866098d2c98285bdc77feb7b659f9ddd_JaffaCakes118

    • Size

      590KB

    • MD5

      866098d2c98285bdc77feb7b659f9ddd

    • SHA1

      a71d4b520e4e5fa718c5b03d2d7589b37baccc63

    • SHA256

      d32a71ad2801fa5c6026d2dc37be492bd313b91822908ac1165a56f15580a685

    • SHA512

      a79af16d841ec6470ee6ef65cf622ea842680784f209430d7af79f2ea7b12736473bc9156453fbf309264be8d9f6e94318b9d1194a523374c051d27eea78241a

    • SSDEEP

      12288:a9rIBYkXWyShwxV7IcNu+qmWNQZH8QizPV8i6wAdvk:a9rMWyRu+qTYmN87wAd8

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks