General

  • Target

    a9a5537295b6f11813bfe0292533b703_JaffaCakes118

  • Size

    567KB

  • Sample

    241127-zy2rwawqgr

  • MD5

    a9a5537295b6f11813bfe0292533b703

  • SHA1

    bd1d78bc6acafdc59573e9f365d8448cf1eda865

  • SHA256

    fb32fc67b59c6eb9657452f8e84bc99725cf58b472a6eba5585c9119afb74032

  • SHA512

    b218f60c1fea5c24026d6de62e0144b004ef5098d5fb52c7a98ba4fa886541e529dc559a508cf8c098eaf809c1b008c3f2b626399423564474b6a07ea1ba6b75

  • SSDEEP

    12288:zrXTJ+zAF4/LaEEACSGKyUxya90R6oxLKmoc6JyfhvETNe6oS:zJ4OG7GNU/q6uodJCvET

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

Cyber

C2

nothingcool.no-ip.biz:82

Mutex

TJ2U03C53J4618

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    csrss.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Error code e:399

  • message_box_title

    Error

  • password

    123456

Targets

    • Target

      a9a5537295b6f11813bfe0292533b703_JaffaCakes118

    • Size

      567KB

    • MD5

      a9a5537295b6f11813bfe0292533b703

    • SHA1

      bd1d78bc6acafdc59573e9f365d8448cf1eda865

    • SHA256

      fb32fc67b59c6eb9657452f8e84bc99725cf58b472a6eba5585c9119afb74032

    • SHA512

      b218f60c1fea5c24026d6de62e0144b004ef5098d5fb52c7a98ba4fa886541e529dc559a508cf8c098eaf809c1b008c3f2b626399423564474b6a07ea1ba6b75

    • SSDEEP

      12288:zrXTJ+zAF4/LaEEACSGKyUxya90R6oxLKmoc6JyfhvETNe6oS:zJ4OG7GNU/q6uodJCvET

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • UAC bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks