General

  • Target

    f7d3941ac933ab20fc17343ae5245556_JaffaCakes118

  • Size

    371KB

  • Sample

    241216-hr3bdszrhr

  • MD5

    f7d3941ac933ab20fc17343ae5245556

  • SHA1

    2e661ec67ab32583534f782df7ea88a6b9e6cef0

  • SHA256

    3fc0faf5be5443486970828cba5e372caf7b0e6d82deaec1e811827abb819537

  • SHA512

    443f8c1e7890bc96699276b19ec08b08897a4e90c017e5a2cc1b026a4d4b9d8cfd4cb1c5222c9b6dc63db8bcfe66ab9be3dcce4c3625e1c439362d9d4f0f6230

  • SSDEEP

    6144:/RAdFsxqAA0mPFYTgsFd7g2Qeb7WTJpaFYXnGWVRSW1HOB7Gx2K:U7JFAXFd7hQehGWWvSWJONAJ

Malware Config

Extracted

Family

cybergate

Version

2.6

C2

rsauthrat.no-ip.biz:80

rsauthrat.no-ip.biz:81

rsauthrat.no-ip.biz:82

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Svchost

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    ilikeyou

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      f7d3941ac933ab20fc17343ae5245556_JaffaCakes118

    • Size

      371KB

    • MD5

      f7d3941ac933ab20fc17343ae5245556

    • SHA1

      2e661ec67ab32583534f782df7ea88a6b9e6cef0

    • SHA256

      3fc0faf5be5443486970828cba5e372caf7b0e6d82deaec1e811827abb819537

    • SHA512

      443f8c1e7890bc96699276b19ec08b08897a4e90c017e5a2cc1b026a4d4b9d8cfd4cb1c5222c9b6dc63db8bcfe66ab9be3dcce4c3625e1c439362d9d4f0f6230

    • SSDEEP

      6144:/RAdFsxqAA0mPFYTgsFd7g2Qeb7WTJpaFYXnGWVRSW1HOB7Gx2K:U7JFAXFd7hQehGWWvSWJONAJ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks