General

  • Target

    c633146dd41c62c20e2ca89f1ac2898b_JaffaCakes118

  • Size

    522KB

  • Sample

    241205-gh4mesxldr

  • MD5

    c633146dd41c62c20e2ca89f1ac2898b

  • SHA1

    2719eb03a5c9f3d5db2f795e81568815fee1fc28

  • SHA256

    7dc277ca195d13ea1190c42fbce75c494e3634eb6fcad6aed6b9a2171d8f0ac9

  • SHA512

    7481ff57d7fd524c7b2807b71365fc93711d071b3c9b6090609bf84e06b4f184abb140d4542f5dbd5a27e923179733617166d2f521ad911b92391da57f1aac1f

  • SSDEEP

    12288:mNdxlPgEDjLMwY5y7s/QFxkWLokhUeBQQTuo3Rv5r+ssyS:mNdxVjq+26RUeMssD

Malware Config

Extracted

Family

cybergate

Version

v1.18.0 - Crack Version

Botnet

remote

C2

fff918273.no-ip.info:84

Mutex

O5H3CX2V6FC3BN

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    /Windows/

  • install_file

    windll.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      c633146dd41c62c20e2ca89f1ac2898b_JaffaCakes118

    • Size

      522KB

    • MD5

      c633146dd41c62c20e2ca89f1ac2898b

    • SHA1

      2719eb03a5c9f3d5db2f795e81568815fee1fc28

    • SHA256

      7dc277ca195d13ea1190c42fbce75c494e3634eb6fcad6aed6b9a2171d8f0ac9

    • SHA512

      7481ff57d7fd524c7b2807b71365fc93711d071b3c9b6090609bf84e06b4f184abb140d4542f5dbd5a27e923179733617166d2f521ad911b92391da57f1aac1f

    • SSDEEP

      12288:mNdxlPgEDjLMwY5y7s/QFxkWLokhUeBQQTuo3Rv5r+ssyS:mNdxVjq+26RUeMssD

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks