General

  • Target

    bae52cd387a219fb60f24f2c7fd63fad_JaffaCakes118

  • Size

    901KB

  • Sample

    241203-awpxvswqgm

  • MD5

    bae52cd387a219fb60f24f2c7fd63fad

  • SHA1

    3f7dc8b9bd927da1278536f78adc79dacef10d71

  • SHA256

    3dbb1e0b3ada191902d1a59f48717086dbbec7975f595700e08306f84fd744ca

  • SHA512

    0431f2e2f38ddeb7d026897e04da094be47ab182ff76a0e56a2d178be386a6a8fe2823f1e5f420a75574af186ed010d09d90718dadb20ff190b20ed6600a4963

  • SSDEEP

    12288:pwo7YNQHLPxez8dFlZqB+H4y63nSr3/35elq50kdVLnvL7uP3SYs261x9n:zwQUz+83ysnQ3v0lq5zdVLuP/s2uxh

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

darbexteam.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft32

  • install_file

    smss.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    Avirnt

  • regkey_hklm

    Avgnt

Targets

    • Target

      bae52cd387a219fb60f24f2c7fd63fad_JaffaCakes118

    • Size

      901KB

    • MD5

      bae52cd387a219fb60f24f2c7fd63fad

    • SHA1

      3f7dc8b9bd927da1278536f78adc79dacef10d71

    • SHA256

      3dbb1e0b3ada191902d1a59f48717086dbbec7975f595700e08306f84fd744ca

    • SHA512

      0431f2e2f38ddeb7d026897e04da094be47ab182ff76a0e56a2d178be386a6a8fe2823f1e5f420a75574af186ed010d09d90718dadb20ff190b20ed6600a4963

    • SSDEEP

      12288:pwo7YNQHLPxez8dFlZqB+H4y63nSr3/35elq50kdVLnvL7uP3SYs261x9n:zwQUz+83ysnQ3v0lq5zdVLuP/s2uxh

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks