Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c06bb886903ab7bfde7543a5a289f8ea_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241204-c4kdfsxmet

  • MD5

    c06bb886903ab7bfde7543a5a289f8ea

  • SHA1

    7b332b47ff64adc36949e1d2ff0e6f88d9882df2

  • SHA256

    ed95bceccbd260e36d6d1141f2156417116d016f3017bda32485104e6db102a4

  • SHA512

    cb6bc86dfe5f7914c064481db824b9e1af490c8665844b4294ab0ad5baba030003047060918794f7141af00ca072ce22f0548067f338b14b83db312197d4d9cd

  • SSDEEP

    12288:aqPHvPVbMJnYP2quL2ZpCr5g9lZk/H7c5aHhjRSJ:9XtYJn+Vc2/Clg9lo7CaBjU

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Server

C2

m0st.no-ip.biz:1337

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    lol1234

  • regkey_hkcu

    HKCU

Targets

    • Target

      c06bb886903ab7bfde7543a5a289f8ea_JaffaCakes118

    • Size

      1.0MB

    • MD5

      c06bb886903ab7bfde7543a5a289f8ea

    • SHA1

      7b332b47ff64adc36949e1d2ff0e6f88d9882df2

    • SHA256

      ed95bceccbd260e36d6d1141f2156417116d016f3017bda32485104e6db102a4

    • SHA512

      cb6bc86dfe5f7914c064481db824b9e1af490c8665844b4294ab0ad5baba030003047060918794f7141af00ca072ce22f0548067f338b14b83db312197d4d9cd

    • SSDEEP

      12288:aqPHvPVbMJnYP2quL2ZpCr5g9lZk/H7c5aHhjRSJ:9XtYJn+Vc2/Clg9lo7CaBjU

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.