General

  • Target

    JaffaCakes118_61082949c7784f589f7b8e308ca10910

  • Size

    274KB

  • Sample

    250101-2fj58azqgj

  • MD5

    61082949c7784f589f7b8e308ca10910

  • SHA1

    e89f4043cd428262cf6012ccd56c7b306fcb8e0a

  • SHA256

    e15a985d5a4f252145354a07b6f49a2213cc2b3a0fc9fe29cad04c7cd2b5083f

  • SHA512

    e5f9716269e45fa598b7454834ae041f8974a23e53bbe25b1ceb2964400e75341d0420cd9c3c6321a9c1def1473f53c9ce1fcd9aeb4cd3c87ee8ccdca6812795

  • SSDEEP

    6144:LMIy/qCS4G06LZP4igjG153q/ZUzD/GSxOZ:LbAqSG069421536yLGvZ

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

Mutex

3L0DN44J3SY4EY

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    .//

  • ftp_interval

    30

  • ftp_password

    iuploadyourpws

  • ftp_port

    21

  • ftp_server

    95.141.27.30

  • ftp_username

    rat

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    .NET Framework is not installed !

  • message_box_title

    .NET Framework

  • password

    cybergate

Targets

    • Target

      JaffaCakes118_61082949c7784f589f7b8e308ca10910

    • Size

      274KB

    • MD5

      61082949c7784f589f7b8e308ca10910

    • SHA1

      e89f4043cd428262cf6012ccd56c7b306fcb8e0a

    • SHA256

      e15a985d5a4f252145354a07b6f49a2213cc2b3a0fc9fe29cad04c7cd2b5083f

    • SHA512

      e5f9716269e45fa598b7454834ae041f8974a23e53bbe25b1ceb2964400e75341d0420cd9c3c6321a9c1def1473f53c9ce1fcd9aeb4cd3c87ee8ccdca6812795

    • SSDEEP

      6144:LMIy/qCS4G06LZP4igjG153q/ZUzD/GSxOZ:LbAqSG069421536yLGvZ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks