General

  • Target

    JaffaCakes118_aa8be72eb1f307aab2e6ffd2fd53d74c

  • Size

    556KB

  • Sample

    250118-qad68stney

  • MD5

    aa8be72eb1f307aab2e6ffd2fd53d74c

  • SHA1

    bfd9da2658c3fe8436049d402a7e8dfc407d3fbe

  • SHA256

    6aa6e582984627a852eb396af51bb10918e53c105a91461a32c0ec090462a85b

  • SHA512

    b9775001ffdfb357af6a1075a6c1c37b46b1ad5be0044f5433d8b8d4ae64a67cd9baede3c70e78f9f29a5c990035ba23258b6a65ec2b0d33b1ca9d87040c7562

  • SSDEEP

    12288:0rhxIdQbu7gxC6JvK0ezixpxgLU8iOQgx:0rhxI0fCEvVezupMiS

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 01

Botnet

Bucato_Luglio

C2

xxxxx6.no-ip.info:25555

Mutex

JIOHIUE7890HF

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Adobe

  • install_file

    Adobe_Updater .exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    NOP%U(=)"£POIUNFéF=)JHG)(?%G?é)(HD(FéHSéIJ=^"£/%GIUOéSPHDFOHOEBIWPORBT)(/Y%?()"YHOUIBJV

  • regkey_hklm

    Adobe Reader

Targets

    • Target

      JaffaCakes118_aa8be72eb1f307aab2e6ffd2fd53d74c

    • Size

      556KB

    • MD5

      aa8be72eb1f307aab2e6ffd2fd53d74c

    • SHA1

      bfd9da2658c3fe8436049d402a7e8dfc407d3fbe

    • SHA256

      6aa6e582984627a852eb396af51bb10918e53c105a91461a32c0ec090462a85b

    • SHA512

      b9775001ffdfb357af6a1075a6c1c37b46b1ad5be0044f5433d8b8d4ae64a67cd9baede3c70e78f9f29a5c990035ba23258b6a65ec2b0d33b1ca9d87040c7562

    • SSDEEP

      12288:0rhxIdQbu7gxC6JvK0ezixpxgLU8iOQgx:0rhxI0fCEvVezupMiS

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks