General

  • Target

    ae4e223d9b3587cba8c93e1bfc81974d_JaffaCakes118

  • Size

    552KB

  • Sample

    241129-cydzgszkfy

  • MD5

    ae4e223d9b3587cba8c93e1bfc81974d

  • SHA1

    33c296e090fdf1d6b4ce9be265d7b9a36a726759

  • SHA256

    c787859c209bcd4b1e8517affc0f7e63160a0adc333134c2d3ea9d8c7bcd2d7c

  • SHA512

    5c851bccf6aaf81645a3f615840efaca53c2b2c645f093655612e9d082932f7b81156dc5cfb1e5622f0f04c3ce1895b759bec8afa2fc19ebca58f123d2d829b8

  • SSDEEP

    12288:15UAVtrJHT8Ae1/im2UHoeWbF42v9hYR8kP:0Alwrp2UHxeXVhnQ

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

valentine

C2

copy-machine.zapto.org:6756

Mutex

537785458106JW

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    cyberous.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    This program is not compatible with your windows edition

  • message_box_title

    ERROR

  • password

    kostas00140295

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      ae4e223d9b3587cba8c93e1bfc81974d_JaffaCakes118

    • Size

      552KB

    • MD5

      ae4e223d9b3587cba8c93e1bfc81974d

    • SHA1

      33c296e090fdf1d6b4ce9be265d7b9a36a726759

    • SHA256

      c787859c209bcd4b1e8517affc0f7e63160a0adc333134c2d3ea9d8c7bcd2d7c

    • SHA512

      5c851bccf6aaf81645a3f615840efaca53c2b2c645f093655612e9d082932f7b81156dc5cfb1e5622f0f04c3ce1895b759bec8afa2fc19ebca58f123d2d829b8

    • SSDEEP

      12288:15UAVtrJHT8Ae1/im2UHoeWbF42v9hYR8kP:0Alwrp2UHxeXVhnQ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks