General

  • Target

    d22304eae9ee245b39108447ce8a78f3_JaffaCakes118

  • Size

    5.3MB

  • Sample

    241207-m7khqsvqgj

  • MD5

    d22304eae9ee245b39108447ce8a78f3

  • SHA1

    6f569c1ef95284b21b3d724e810daeb571aa49aa

  • SHA256

    bdf85470093170e796789d73d5188ba01e9355539883f4803bda753073860718

  • SHA512

    b4e10c991f71c444153419d5485c1fcccb615b15f1b5ba7a1f92fac263570a742b0c1efa2226ba0a5ee48aff1c64f6a7e302898c21c8931d651a87141bdd2665

  • SSDEEP

    49152:gh87j4ag9ZD5IYmemK/AHF5KNM82/ZjmwITS3CTPJ4Z:Y8Ia9

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

CryptoSuite

C2

127.0.0.1:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    server.exe

  • install_file

    serverr.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Component 'Bar.ocx' or one of its dependencies not correctly registered: a file is missing or invalid

  • message_box_title

    Msn Password Crack v1.2

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      d22304eae9ee245b39108447ce8a78f3_JaffaCakes118

    • Size

      5.3MB

    • MD5

      d22304eae9ee245b39108447ce8a78f3

    • SHA1

      6f569c1ef95284b21b3d724e810daeb571aa49aa

    • SHA256

      bdf85470093170e796789d73d5188ba01e9355539883f4803bda753073860718

    • SHA512

      b4e10c991f71c444153419d5485c1fcccb615b15f1b5ba7a1f92fac263570a742b0c1efa2226ba0a5ee48aff1c64f6a7e302898c21c8931d651a87141bdd2665

    • SSDEEP

      49152:gh87j4ag9ZD5IYmemK/AHF5KNM82/ZjmwITS3CTPJ4Z:Y8Ia9

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks