General

  • Target

    JaffaCakes118_d97e5500fe1dfb83b3362eeec9d02000

  • Size

    379KB

  • Sample

    250120-c5gzqaxpfp

  • MD5

    d97e5500fe1dfb83b3362eeec9d02000

  • SHA1

    3a7b3834b659d99c0dcdb226f6d72e48a47462ec

  • SHA256

    9fb7977fb32cf02daeb62b939f71b7189eea366ecc20ad35989b6f6e88f619cf

  • SHA512

    0debb12820f08717ab9d32339698683b39befe97a8f5094027acaaf58c012e6c175be3eb59b983acdcdb7bb8642de581390b2ddc942e02e75d6cfe7346f0ee1d

  • SSDEEP

    6144:d46GlIvMqYhAtFpqv5eF5phLirROvul9tp1fGKtCBdMtVUkBXUJnw:JEIvJhFpqxeFtLibZcBQW7J

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Victima

C2

mefroozen.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./\wwwhome\spy/

  • ftp_interval

    10

  • ftp_password

    mefroozen333

  • ftp_port

    21

  • ftp_server

    ftp.drivehq.com

  • ftp_username

    mefroozen

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    Do you like hackers ?

  • message_box_title

    Question

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_d97e5500fe1dfb83b3362eeec9d02000

    • Size

      379KB

    • MD5

      d97e5500fe1dfb83b3362eeec9d02000

    • SHA1

      3a7b3834b659d99c0dcdb226f6d72e48a47462ec

    • SHA256

      9fb7977fb32cf02daeb62b939f71b7189eea366ecc20ad35989b6f6e88f619cf

    • SHA512

      0debb12820f08717ab9d32339698683b39befe97a8f5094027acaaf58c012e6c175be3eb59b983acdcdb7bb8642de581390b2ddc942e02e75d6cfe7346f0ee1d

    • SSDEEP

      6144:d46GlIvMqYhAtFpqv5eF5phLirROvul9tp1fGKtCBdMtVUkBXUJnw:JEIvJhFpqxeFtLibZcBQW7J

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks