General

  • Target

    b1ea4f6152c38855bec9673d558fab7b_JaffaCakes118

  • Size

    366KB

  • Sample

    241129-r282cs1kgz

  • MD5

    b1ea4f6152c38855bec9673d558fab7b

  • SHA1

    19f9c28a04b255f2a075681df52ca93c2f5e8ba2

  • SHA256

    ee9676de09f2dae5f4f440ed58182c91e6335adc0c531a6e2dfe03513d9a79d3

  • SHA512

    682ac31a516c81ab443adc7a8379eff56080f1fff9315ba6bdb8aa926919ed332469a586d2eb9366f1ec36bd45145143c2af35d223113439424e4e3c630057c5

  • SSDEEP

    6144:lqHYCyOYE1MYADaRnzHMU0QrnuGvoovt/xNiU2Pu7BpLgJtRsLfIjHeXY:JvdEuYAORnzHMU9rnhv1t/ESBpLgJD0a

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

email-msn.no-ip.org:87

Mutex

***WHOST***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    whost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    111001

Targets

    • Target

      b1ea4f6152c38855bec9673d558fab7b_JaffaCakes118

    • Size

      366KB

    • MD5

      b1ea4f6152c38855bec9673d558fab7b

    • SHA1

      19f9c28a04b255f2a075681df52ca93c2f5e8ba2

    • SHA256

      ee9676de09f2dae5f4f440ed58182c91e6335adc0c531a6e2dfe03513d9a79d3

    • SHA512

      682ac31a516c81ab443adc7a8379eff56080f1fff9315ba6bdb8aa926919ed332469a586d2eb9366f1ec36bd45145143c2af35d223113439424e4e3c630057c5

    • SSDEEP

      6144:lqHYCyOYE1MYADaRnzHMU0QrnuGvoovt/xNiU2Pu7BpLgJtRsLfIjHeXY:JvdEuYAORnzHMU9rnhv1t/ESBpLgJD0a

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks