General

  • Target

    fe31faca365028792ef7fa4cbf4844d8_JaffaCakes118

  • Size

    392KB

  • Sample

    241219-dnkvqavlhz

  • MD5

    fe31faca365028792ef7fa4cbf4844d8

  • SHA1

    92f6af174db5d82946b8cc8c8b5168d219dd0303

  • SHA256

    b34c1bac8e7f11af1ea329e3caa28a6f18cd82608553b5b0373fc45730ac2713

  • SHA512

    78c73a824c291eb9da15bb3cb09a4be9897ac16827ea8e733d6c50c60e073675f73dd89658092bba3f99564a23705478b94acbb3c392dd10dc329802d6f880f3

  • SSDEEP

    12288:09hQaRyV8Wb0LDbD/7gGSRUcJ/a3y8Kx1ooADepf:YnRyhb0LDbD/7Bn+yyVx1oLDW

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

ÖÍíÉ

C2

127.0.0.1:288

boxrabouh.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_file

    windows.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    t?tulo da mensagem

  • password

    abcd1234

Targets

    • Target

      fe31faca365028792ef7fa4cbf4844d8_JaffaCakes118

    • Size

      392KB

    • MD5

      fe31faca365028792ef7fa4cbf4844d8

    • SHA1

      92f6af174db5d82946b8cc8c8b5168d219dd0303

    • SHA256

      b34c1bac8e7f11af1ea329e3caa28a6f18cd82608553b5b0373fc45730ac2713

    • SHA512

      78c73a824c291eb9da15bb3cb09a4be9897ac16827ea8e733d6c50c60e073675f73dd89658092bba3f99564a23705478b94acbb3c392dd10dc329802d6f880f3

    • SSDEEP

      12288:09hQaRyV8Wb0LDbD/7gGSRUcJ/a3y8Kx1ooADepf:YnRyhb0LDbD/7Bn+yyVx1oLDW

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks