General

  • Target

    f8847d9f78aececc5451124ff111ba61_JaffaCakes118

  • Size

    432KB

  • Sample

    241216-l7b1xswkay

  • MD5

    f8847d9f78aececc5451124ff111ba61

  • SHA1

    46828dea4cad9b0cdbab9ea9a02d7aeebd2fc7d5

  • SHA256

    f5ff8fb0a875d01cc61914323c8a17b4562e3d8d53e3e635f010c08cc19b61ba

  • SHA512

    b4c67a9bb540e96f8975c137af8c4c880b83b7edc6ed5a79949e59747c0f830ee0ef6a40a3d3780d041faebceec68b2cfb3358da564e1c36e45e22fb82fe23ee

  • SSDEEP

    6144:p0WF9YcrYJDTZ9e3yYBGpxYdYNgTHrC9nK/SJLJGgZYZNTwr5iE7Cb2Z0p7Rtvom:p0MVSjrpxEH0n2S9cNWCbppt2VD/ZWL

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

c0oc0o

C2

x0o0x.zapto.org:288

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    windoows

  • install_file

    system.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      f8847d9f78aececc5451124ff111ba61_JaffaCakes118

    • Size

      432KB

    • MD5

      f8847d9f78aececc5451124ff111ba61

    • SHA1

      46828dea4cad9b0cdbab9ea9a02d7aeebd2fc7d5

    • SHA256

      f5ff8fb0a875d01cc61914323c8a17b4562e3d8d53e3e635f010c08cc19b61ba

    • SHA512

      b4c67a9bb540e96f8975c137af8c4c880b83b7edc6ed5a79949e59747c0f830ee0ef6a40a3d3780d041faebceec68b2cfb3358da564e1c36e45e22fb82fe23ee

    • SSDEEP

      6144:p0WF9YcrYJDTZ9e3yYBGpxYdYNgTHrC9nK/SJLJGgZYZNTwr5iE7Cb2Z0p7Rtvom:p0MVSjrpxEH0n2S9cNWCbppt2VD/ZWL

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks