General

  • Target

    f83b940f77a2e62a320d5e3f0f3422a7_JaffaCakes118

  • Size

    702KB

  • Sample

    241216-krmxtasret

  • MD5

    f83b940f77a2e62a320d5e3f0f3422a7

  • SHA1

    bb0bea7133b26e6d89ab5c298247c472e646f532

  • SHA256

    e97c679da711f3e1cf7e2290d642b9fe6685039e4017e7c9c893f3ba83bcead0

  • SHA512

    bd8f03fb74c390b01d911020c02feb0e7a0b23c06bdf0cf5a3c51289126af327d3ea9c96fcc9a4ed928d8082c7f49a95769b75f5d0f611c10e3cb1742b7abec9

  • SSDEEP

    12288:Z6wVuRiO7nH/HEIbNzuNhZ13j/mwdW5UswWB7/oG4hafOHRgeKgxv3t:QwwcqH/HDbNKZ13j/szZpFEKgxv3t

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

spassr

C2

cybergatefuck.dyndns.org:60423

Mutex

B21100I81ED2XO

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    win32Gl

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

Targets

    • Target

      f83b940f77a2e62a320d5e3f0f3422a7_JaffaCakes118

    • Size

      702KB

    • MD5

      f83b940f77a2e62a320d5e3f0f3422a7

    • SHA1

      bb0bea7133b26e6d89ab5c298247c472e646f532

    • SHA256

      e97c679da711f3e1cf7e2290d642b9fe6685039e4017e7c9c893f3ba83bcead0

    • SHA512

      bd8f03fb74c390b01d911020c02feb0e7a0b23c06bdf0cf5a3c51289126af327d3ea9c96fcc9a4ed928d8082c7f49a95769b75f5d0f611c10e3cb1742b7abec9

    • SSDEEP

      12288:Z6wVuRiO7nH/HEIbNzuNhZ13j/mwdW5UswWB7/oG4hafOHRgeKgxv3t:QwwcqH/HDbNKZ13j/szZpFEKgxv3t

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks