General

  • Target

    f2c59e0d786b720651b2202fc07c3bc9_JaffaCakes118

  • Size

    334KB

  • Sample

    241215-hgzgraylbq

  • MD5

    f2c59e0d786b720651b2202fc07c3bc9

  • SHA1

    3a7ccc843b49a527ec0549d3dde448b9af24ee88

  • SHA256

    2ee6973497b7017f17a73b6e5835689e654bd3d879672811ed4753eaae6f276d

  • SHA512

    2228a065e9a1beaeb066a46e87c4ed733039ca5a2e1d3e1cb35fd39db48d1d33398cee4bcbac912b810a8e2cf5d67d03db0883d1ee526db8ad6a4a5c2d5c86cf

  • SSDEEP

    6144:sKVIf7JsU4bScxpwPqs99tCIJW58C2q7dEi8xuAvY/eNgRPfJ:nVIf7GU4/pI9H8BGggOPfJ

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

mosa7ee.no-ip.biz:81

mosa7ee.no-ip.biz:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    runing.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      f2c59e0d786b720651b2202fc07c3bc9_JaffaCakes118

    • Size

      334KB

    • MD5

      f2c59e0d786b720651b2202fc07c3bc9

    • SHA1

      3a7ccc843b49a527ec0549d3dde448b9af24ee88

    • SHA256

      2ee6973497b7017f17a73b6e5835689e654bd3d879672811ed4753eaae6f276d

    • SHA512

      2228a065e9a1beaeb066a46e87c4ed733039ca5a2e1d3e1cb35fd39db48d1d33398cee4bcbac912b810a8e2cf5d67d03db0883d1ee526db8ad6a4a5c2d5c86cf

    • SSDEEP

      6144:sKVIf7JsU4bScxpwPqs99tCIJW58C2q7dEi8xuAvY/eNgRPfJ:nVIf7GU4/pI9H8BGggOPfJ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks