General

  • Target

    bf2e27760e7b5e67d462d8cdf2a254fd_JaffaCakes118

  • Size

    397KB

  • Sample

    241203-zn3lestmby

  • MD5

    bf2e27760e7b5e67d462d8cdf2a254fd

  • SHA1

    15125ef4dc81a6cc66d5538174a6034184fc7ea2

  • SHA256

    da2832538e89943dd10b604dd9e4426a193257876a51de08f9fbbfd183415a3e

  • SHA512

    39c3615b4145b2557514f1765cfca25ed36c7d50a5210bee1524aeccb715142f623f8dfb3493532a8fca0b9dc9025c8d1700edcf4aa5769e9e1547eca2c0cb30

  • SSDEEP

    12288:BqheWG5GeRH0+0KyhxW0Z3ht+FdrZsPdMaS9:BGG5fRHVn0Z3fC1sPdM/9

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Fed

C2

f3m.no-ip.info:1982

Mutex

UR2773UPSX11WQ

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Win

  • install_file

    Windowsupdate.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    abc123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      Install.exe

    • Size

      7.3MB

    • MD5

      90e0374d53bd364405bf1464ed43aa0d

    • SHA1

      b137ae0ba73dade97e754e794b8482bd140503bd

    • SHA256

      d6568832283a943d8cfd607efbf7e8036388ec457c2193a4525115718a2b5b8a

    • SHA512

      23aa834cbb6b02ebb8011a6d27dbd8fe68a3eca1cba5a5ffd05eb794685edebf6fae19a20b8e93759c290677b5650e792a49c5cfed1867b55b3f42c5045cfaf8

    • SSDEEP

      12288:wraNNP1wmNfnkh9LJMFr2RnvXbdrC/bT5eVZOHE:/NIl1rdq0m

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks