General

  • Target

    JaffaCakes118_deb6589de91e51fd7cccca3ccd2c3d8a

  • Size

    570KB

  • Sample

    250120-g35efswjek

  • MD5

    deb6589de91e51fd7cccca3ccd2c3d8a

  • SHA1

    0552f24e0797d833819bc8cf21b82fb97a8ff673

  • SHA256

    6320f8187f894426f9edf2bf746eaa3cbdf04bba66e7edffb777bc013fab30d2

  • SHA512

    906c7d8d2cbc5c5ddce675be50e04a259bd62ea8bf6008f072b9e13e1f99e963164c1c6d650c09e874650bd37266b4aee58340649bd1d729f656d859f31fd8a8

  • SSDEEP

    12288:gYkKbeWq0GINDDLxCBF8w8wtGRiYVCvW+3IqmmkOOcDvA:xkNWWINDJC38w6VO3SFOQ

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Victima Nueva

C2

ziwaa.no-ip.biz:2532

Mutex

shalmM

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Win32

  • install_file

    Nos.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_deb6589de91e51fd7cccca3ccd2c3d8a

    • Size

      570KB

    • MD5

      deb6589de91e51fd7cccca3ccd2c3d8a

    • SHA1

      0552f24e0797d833819bc8cf21b82fb97a8ff673

    • SHA256

      6320f8187f894426f9edf2bf746eaa3cbdf04bba66e7edffb777bc013fab30d2

    • SHA512

      906c7d8d2cbc5c5ddce675be50e04a259bd62ea8bf6008f072b9e13e1f99e963164c1c6d650c09e874650bd37266b4aee58340649bd1d729f656d859f31fd8a8

    • SSDEEP

      12288:gYkKbeWq0GINDDLxCBF8w8wtGRiYVCvW+3IqmmkOOcDvA:xkNWWINDJC38w6VO3SFOQ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks