General

  • Target

    f80dd4b0180fea4d12de4d0518945131_JaffaCakes118

  • Size

    503KB

  • Sample

    241216-jvng3ssnan

  • MD5

    f80dd4b0180fea4d12de4d0518945131

  • SHA1

    28d2331271a5ce92bcb0b3ae5cfe4194c9770b68

  • SHA256

    6ab59c55ec317b4d38766b9b3dde85c6de5a7154f5e9ed0f7b6bdb97085000d4

  • SHA512

    24f2635716dadc9c37db10ffd9e0338fcd39b2cf5d8af0e23bc8c9f6d78f00fa99ede552e6b5041bf0c7105fccbf247d060a8e10aa809804ba07887b2b08615c

  • SSDEEP

    12288:1sU9GQAFpxWmLtZAub3KY8o6qX/FwF803eBa6lc:G4GQUpxW6tZnDKzo68wF80uBNq

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

noip

C2

metafunn.no-ip.biz:1331

Mutex

7D148Y5AW40DI4

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    csrss.exe

  • install_dir

    WinDir

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    noip

Targets

    • Target

      f80dd4b0180fea4d12de4d0518945131_JaffaCakes118

    • Size

      503KB

    • MD5

      f80dd4b0180fea4d12de4d0518945131

    • SHA1

      28d2331271a5ce92bcb0b3ae5cfe4194c9770b68

    • SHA256

      6ab59c55ec317b4d38766b9b3dde85c6de5a7154f5e9ed0f7b6bdb97085000d4

    • SHA512

      24f2635716dadc9c37db10ffd9e0338fcd39b2cf5d8af0e23bc8c9f6d78f00fa99ede552e6b5041bf0c7105fccbf247d060a8e10aa809804ba07887b2b08615c

    • SSDEEP

      12288:1sU9GQAFpxWmLtZAub3KY8o6qX/FwF803eBa6lc:G4GQUpxW6tZnDKzo68wF80uBNq

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks