General

  • Target

    JaffaCakes118_d19c6f63f83ed90c6d55221e687d3f85

  • Size

    687KB

  • Sample

    250119-yqa4hstpcn

  • MD5

    d19c6f63f83ed90c6d55221e687d3f85

  • SHA1

    c785358b97172243cee1a56bb81fc826e098966b

  • SHA256

    4de06536637e0eb796dcb51816126580ae17e0f68532e3460a7c7049884c9d67

  • SHA512

    9e510ce576429784f1a777dd4b8f328ad2d2dceaa8b693af94391c39c4f5a1c61c5be1e4ae9d92f2d1035d84314dc1657ab3a7f2272de3c586c1955a422140ff

  • SSDEEP

    12288:gw9pA/m3AzcJRj0DDZPLeAvxlKFg++ijkQm6lwe/ig37/QMtMJAl:gmiwsDDBjvxSg++iQQm6l3J37/QMt4O

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

total

C2

getarm.no-ip.biz:5110

Mutex

QB60E5C315M3V4

Attributes
  • enable_keylogger

    false

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    win90.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Error in True!

  • message_box_title

    Windows

  • password

    afrane

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_d19c6f63f83ed90c6d55221e687d3f85

    • Size

      687KB

    • MD5

      d19c6f63f83ed90c6d55221e687d3f85

    • SHA1

      c785358b97172243cee1a56bb81fc826e098966b

    • SHA256

      4de06536637e0eb796dcb51816126580ae17e0f68532e3460a7c7049884c9d67

    • SHA512

      9e510ce576429784f1a777dd4b8f328ad2d2dceaa8b693af94391c39c4f5a1c61c5be1e4ae9d92f2d1035d84314dc1657ab3a7f2272de3c586c1955a422140ff

    • SSDEEP

      12288:gw9pA/m3AzcJRj0DDZPLeAvxlKFg++ijkQm6lwe/ig37/QMtMJAl:gmiwsDDBjvxSg++iQQm6l3J37/QMt4O

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks