General

  • Target

    JaffaCakes118_037e8fda86fe971d1a81cbe2ab73451e

  • Size

    802KB

  • Sample

    250112-a8xs8sxncz

  • MD5

    037e8fda86fe971d1a81cbe2ab73451e

  • SHA1

    75bc843da28ed01d575c576358f9277bbd7d917c

  • SHA256

    4d9afa20c96bd0a9ba1d809850990688f97d68d7e50557e7e0052a3635926d7b

  • SHA512

    a3456e44ed97383c5a46814e098d21e687c7b19d60b8c22dc5793802b0376d1aae55561c613be04e685d0d5edf0aa06706c8d0294ccd79e6d794beae52ad8c30

  • SSDEEP

    12288:CDbmxcDtOE2pRNacUF5Y1byJZSjDyrnltFu+0qAelh/dagney9J2+h8MD0Sz3mcj:T6Y5acF1OrrlcqA0JdJVuMD0SZNd

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

ccristinabaldi.no-ip.biz:9999

Mutex

E6L2TP63G381J8

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1976

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_037e8fda86fe971d1a81cbe2ab73451e

    • Size

      802KB

    • MD5

      037e8fda86fe971d1a81cbe2ab73451e

    • SHA1

      75bc843da28ed01d575c576358f9277bbd7d917c

    • SHA256

      4d9afa20c96bd0a9ba1d809850990688f97d68d7e50557e7e0052a3635926d7b

    • SHA512

      a3456e44ed97383c5a46814e098d21e687c7b19d60b8c22dc5793802b0376d1aae55561c613be04e685d0d5edf0aa06706c8d0294ccd79e6d794beae52ad8c30

    • SSDEEP

      12288:CDbmxcDtOE2pRNacUF5Y1byJZSjDyrnltFu+0qAelh/dagney9J2+h8MD0Sz3mcj:T6Y5acF1OrrlcqA0JdJVuMD0SZNd

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks