General

  • Target

    a3370c5d66e628bc148bfdace5465fbc_JaffaCakes118

  • Size

    337KB

  • Sample

    241126-v1mnhsxmfm

  • MD5

    a3370c5d66e628bc148bfdace5465fbc

  • SHA1

    33143572e70ec22e6ff8eb904c07c9de5ea9ef11

  • SHA256

    3e1dc6e0272aa2cd5bfad7c4d9cb3d5ce8cd0d69785cce9463d6027cec2d02c2

  • SHA512

    70cbb15e7cd8637f74156a8819c91cbb4bb2ee4dd60908b98766399c3c60b848d1a583c1c14b4365cd3b71e41fd62f473858e1fb864f41e9c3d590478418775d

  • SSDEEP

    6144:YnTrsYhi92qPsmN7zFhNauBn0GkZHE8RQMCuDoIZeswfl4uflLpyqI5xgq:ylzq/HrBnlkOHMeH7vlpe5x3

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

google

C2

ereticus1.no-ip.org:999

Mutex

8V2K4D5K232835

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    install

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    eretico

Targets

    • Target

      a3370c5d66e628bc148bfdace5465fbc_JaffaCakes118

    • Size

      337KB

    • MD5

      a3370c5d66e628bc148bfdace5465fbc

    • SHA1

      33143572e70ec22e6ff8eb904c07c9de5ea9ef11

    • SHA256

      3e1dc6e0272aa2cd5bfad7c4d9cb3d5ce8cd0d69785cce9463d6027cec2d02c2

    • SHA512

      70cbb15e7cd8637f74156a8819c91cbb4bb2ee4dd60908b98766399c3c60b848d1a583c1c14b4365cd3b71e41fd62f473858e1fb864f41e9c3d590478418775d

    • SSDEEP

      6144:YnTrsYhi92qPsmN7zFhNauBn0GkZHE8RQMCuDoIZeswfl4uflLpyqI5xgq:ylzq/HrBnlkOHMeH7vlpe5x3

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks