General

  • Target

    JaffaCakes118_6f178714e36cb29185aad0b2432b7855

  • Size

    287KB

  • Sample

    250103-yfph6asqek

  • MD5

    6f178714e36cb29185aad0b2432b7855

  • SHA1

    25a1eb36efc78f080e1f27147e529bd9a6c18cff

  • SHA256

    1c3e728c18c4d0fd11e2db692d113515d428ee5ea5e5b1ef6f116656895e7c2d

  • SHA512

    b1abb233f1217dda772597f6e82931496b9495b34e902b5d343a9d211b6b380b0710bf68820aa0fa91872e56ad851af9a51b1a8902017746e7f5b069fc4f532f

  • SSDEEP

    6144:+mcD66RRjX5JGmrpQsK3RD2u270jupCJsCxC/:7cD663mZ2zkPaCxU

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

photo

C2

dimkinfunnypics.zapto.org:3128

dimkinfunnypics.zapto.org:80

dimkinfunnypics.zapto.org:81

dimkinfunnypics.zapto.org:8080

dimkinfunnypics.zapto.org:25

dimkinfunnypics.zapto.org:110

Mutex

*3e4f67G*MUTEX*44h86hjY7*

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./public_html/logs/

  • ftp_interval

    60

  • ftp_password

    otz6j33t

  • ftp_port

    21

  • ftp_server

    funnypics.hop.ru

  • ftp_username

    w376023

  • injected_process

    explorer.exe

  • install_file

    kernel32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    -666+

  • regkey_hkcu

    kernel32.exe

  • regkey_hklm

    kernel32.exe

Extracted

Family

latentbot

C2

dimkinfunnypics.zapto.org

Targets

    • Target

      JaffaCakes118_6f178714e36cb29185aad0b2432b7855

    • Size

      287KB

    • MD5

      6f178714e36cb29185aad0b2432b7855

    • SHA1

      25a1eb36efc78f080e1f27147e529bd9a6c18cff

    • SHA256

      1c3e728c18c4d0fd11e2db692d113515d428ee5ea5e5b1ef6f116656895e7c2d

    • SHA512

      b1abb233f1217dda772597f6e82931496b9495b34e902b5d343a9d211b6b380b0710bf68820aa0fa91872e56ad851af9a51b1a8902017746e7f5b069fc4f532f

    • SSDEEP

      6144:+mcD66RRjX5JGmrpQsK3RD2u270jupCJsCxC/:7cD663mZ2zkPaCxU

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks