General

  • Target

    c405d8cbfb500630886f4ae1458e8d01_JaffaCakes118

  • Size

    552KB

  • Sample

    241204-x2qsnssnep

  • MD5

    c405d8cbfb500630886f4ae1458e8d01

  • SHA1

    87b27b8305108b5dbaefd9b0957dd878f836fcc8

  • SHA256

    e00b4dabb7e3144882f37e5ff6a1e14fa231fa42c61e75445fb4fe427156c3f4

  • SHA512

    0c7bc248f563ee84c06a362941ef8a3c2d60d6ebc8b9cdd062ac9df084ed53c43649b7e496cc69b6c101c0a140a27daae4ada353a657e853e505205b6570b64e

  • SSDEEP

    6144:TgCQJ+8MLjXQpClisfqZIHPRFBb96QcvpIZQLF98Wol+BjbQ+58JC3lwRtAbhCks:hRmCP/Bb9qvpsMFKlkka4CWRtAbh46

Malware Config

Extracted

Family

cybergate

Version

v1.05.12

Botnet

CyberGate

C2

anjofael.no-ip.org:1610

Mutex

21335X13038XV6

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Cyber

  • install_file

    Cyber.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    louco30

Targets

    • Target

      c405d8cbfb500630886f4ae1458e8d01_JaffaCakes118

    • Size

      552KB

    • MD5

      c405d8cbfb500630886f4ae1458e8d01

    • SHA1

      87b27b8305108b5dbaefd9b0957dd878f836fcc8

    • SHA256

      e00b4dabb7e3144882f37e5ff6a1e14fa231fa42c61e75445fb4fe427156c3f4

    • SHA512

      0c7bc248f563ee84c06a362941ef8a3c2d60d6ebc8b9cdd062ac9df084ed53c43649b7e496cc69b6c101c0a140a27daae4ada353a657e853e505205b6570b64e

    • SSDEEP

      6144:TgCQJ+8MLjXQpClisfqZIHPRFBb96QcvpIZQLF98Wol+BjbQ+58JC3lwRtAbhCks:hRmCP/Bb9qvpsMFKlkka4CWRtAbh46

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks