Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c8ebbc295f3e60bfbe27eb142ed303cb_JaffaCakes118

  • Size

    305KB

  • Sample

    241205-w8gb5swpcv

  • MD5

    c8ebbc295f3e60bfbe27eb142ed303cb

  • SHA1

    7f9791e6805685643a67ba371dbf219cd84e11fb

  • SHA256

    a67826fef4706587f8cf6600a6a3e5d8159392ea024e751a227ed46c78746132

  • SHA512

    79cbeb86be89d90000bddef2f670045597ee963563fdc0c06008f4abf7fc1ff711863de826f76eaae0e7cb4c1f5e9e1d362edb3ad12956fd84c3b2617b62f2bd

  • SSDEEP

    6144:FxpyAqoeCJ+vxbcWcVAunzr9RK0gvYZOFHnzD2ejgtEb5aF7LCr9KhdDHEIcwh4t:FxG9V56zxR9OFHzK5Eb5adCUiIcwhxQ

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

MSIN555

C2

ayarbaban.no-ip.biz:83

Mutex

G755LRX1688IIJ

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_title

    Error

  • password

    1234567

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      c8ebbc295f3e60bfbe27eb142ed303cb_JaffaCakes118

    • Size

      305KB

    • MD5

      c8ebbc295f3e60bfbe27eb142ed303cb

    • SHA1

      7f9791e6805685643a67ba371dbf219cd84e11fb

    • SHA256

      a67826fef4706587f8cf6600a6a3e5d8159392ea024e751a227ed46c78746132

    • SHA512

      79cbeb86be89d90000bddef2f670045597ee963563fdc0c06008f4abf7fc1ff711863de826f76eaae0e7cb4c1f5e9e1d362edb3ad12956fd84c3b2617b62f2bd

    • SSDEEP

      6144:FxpyAqoeCJ+vxbcWcVAunzr9RK0gvYZOFHnzD2ejgtEb5aF7LCr9KhdDHEIcwh4t:FxG9V56zxR9OFHzK5Eb5adCUiIcwhxQ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Modifies security service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.