General

  • Target

    dca68e77666ddfd58b37d42f28e95ddd_JaffaCakes118

  • Size

    488KB

  • Sample

    241210-c7nkaawlgr

  • MD5

    dca68e77666ddfd58b37d42f28e95ddd

  • SHA1

    1c70943ae4c285bdf09c209f129140705302f995

  • SHA256

    ab1a11b37ca2f5e39dd3e2f5a540f956a4608889107bb0a2361ecfb9175c3773

  • SHA512

    f80d1065041bea51853bd46b9e4e835a39e216528cd3e4a3977d209f3528fa312942132f43f4a1ae36080625aa4e77d39eb59ad4e6093a75b95e50fbdea14a74

  • SSDEEP

    12288:Ys6k3pk7ywoIttX+zM8H08iaWU4FLZ412:YsLZk7y9IttuzMqvfmLZ412

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

SS02

C2

blabla.myvnc.com:10642

Mutex

1D6NJ886CSCM4F

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    shroms4life

Targets

    • Target

      dca68e77666ddfd58b37d42f28e95ddd_JaffaCakes118

    • Size

      488KB

    • MD5

      dca68e77666ddfd58b37d42f28e95ddd

    • SHA1

      1c70943ae4c285bdf09c209f129140705302f995

    • SHA256

      ab1a11b37ca2f5e39dd3e2f5a540f956a4608889107bb0a2361ecfb9175c3773

    • SHA512

      f80d1065041bea51853bd46b9e4e835a39e216528cd3e4a3977d209f3528fa312942132f43f4a1ae36080625aa4e77d39eb59ad4e6093a75b95e50fbdea14a74

    • SSDEEP

      12288:Ys6k3pk7ywoIttX+zM8H08iaWU4FLZ412:YsLZk7y9IttuzMqvfmLZ412

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks