General

  • Target

    b161656624eba77b211c6496570e7c52_JaffaCakes118

  • Size

    708KB

  • Sample

    241129-p66exswpcz

  • MD5

    b161656624eba77b211c6496570e7c52

  • SHA1

    f093c9036af604d0828d3f2ea9958b87121c3c9e

  • SHA256

    b8e52d8694d051cd806b27afe2c77d85eb41c5a8e7e260989f4a9892dbc6ef63

  • SHA512

    fd97b0e234700c55dbeb5463ccec1b21fce1f6638b4f8d2e0f4c96bd85756531614dd782838bc75fe8d6a7f6ea868002c14348d9735fb8a53f2e9942aa405536

  • SSDEEP

    12288:toliA0OOiTxtvrmuiPXgtwV6GDl050UwYIPHNqYLfQ1qCq/i//oXf1zsjekzdR:tdA0IXeTqft60JBR

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

X-Oct13

C2

explorecheck.no-ip.biz:60101

Mutex

353183ODGI4UI7

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    InternetExplore

  • install_file

    iexplore.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    12345678

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      b161656624eba77b211c6496570e7c52_JaffaCakes118

    • Size

      708KB

    • MD5

      b161656624eba77b211c6496570e7c52

    • SHA1

      f093c9036af604d0828d3f2ea9958b87121c3c9e

    • SHA256

      b8e52d8694d051cd806b27afe2c77d85eb41c5a8e7e260989f4a9892dbc6ef63

    • SHA512

      fd97b0e234700c55dbeb5463ccec1b21fce1f6638b4f8d2e0f4c96bd85756531614dd782838bc75fe8d6a7f6ea868002c14348d9735fb8a53f2e9942aa405536

    • SSDEEP

      12288:toliA0OOiTxtvrmuiPXgtwV6GDl050UwYIPHNqYLfQ1qCq/i//oXf1zsjekzdR:tdA0IXeTqft60JBR

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks