General

  • Target

    JaffaCakes118_d71d3040fe548d91c57ddc49927ab83f

  • Size

    280KB

  • Sample

    250120-az15astlhn

  • MD5

    d71d3040fe548d91c57ddc49927ab83f

  • SHA1

    6d09df70279c72685b024f7031318718f1c9ac91

  • SHA256

    113b62f47496644fa7efab855416c4776c602ef0db9cda6518e2aa30dffe27c8

  • SHA512

    124880a2daf6104627ddb56905c0d95c16c7d44f9824065f4015849daeab388cc0e6671aa3ac849e794495497335b7e62f18ec940a8da6ade3fb02160a2a59f2

  • SSDEEP

    6144:goHsFX9UYekVu6SepOZ89yWB521LTQb+b//8r1:CFX9LekseEZ89NQLTjL/2

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

w_060611

C2

xro.mine.nu:27011

xro.mine.nu:27010

xro.mine.nu:27009

Mutex

2QF615K6828NPY

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    wnlogon

  • install_file

    wnlogon.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Targets

    • Target

      JaffaCakes118_d71d3040fe548d91c57ddc49927ab83f

    • Size

      280KB

    • MD5

      d71d3040fe548d91c57ddc49927ab83f

    • SHA1

      6d09df70279c72685b024f7031318718f1c9ac91

    • SHA256

      113b62f47496644fa7efab855416c4776c602ef0db9cda6518e2aa30dffe27c8

    • SHA512

      124880a2daf6104627ddb56905c0d95c16c7d44f9824065f4015849daeab388cc0e6671aa3ac849e794495497335b7e62f18ec940a8da6ade3fb02160a2a59f2

    • SSDEEP

      6144:goHsFX9UYekVu6SepOZ89yWB521LTQb+b//8r1:CFX9LekseEZ89NQLTjL/2

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks