General

  • Target

    JaffaCakes118_040ef52d3747f01085ff7b5ddfcde870

  • Size

    325KB

  • Sample

    250121-mzsjdazmb1

  • MD5

    040ef52d3747f01085ff7b5ddfcde870

  • SHA1

    3cb68cda145843e470ef7641dc0968f6e8cd4324

  • SHA256

    227cf591401173bb3f71c8bcb777f1be94cf1b058f14f6058fe8b7a6397522e8

  • SHA512

    ceeb7832e1f4956e6703793b29538ff128eb32c09996ecef24a102fdc5398fe084770c2fcf5350f1c4d971ab40223637d23cbeb99e7ec55fcc8986ffc9a8eea1

  • SSDEEP

    6144:WW+Tk7wAOqOZ3c5aZQL6O7n8HFXLjy4iWdhXLfmTZRF/riIk5i4E8aKDi+:wZM5aM14phXLfi/5aK4i+

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Bruxitima TESTE

C2

bruxinhorat.no-ip.org:83

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    archivers

  • install_file

    lsass.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Seu sistema não pode execultar esse tipo de arquivo

  • message_box_title

    Fatal Error

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_040ef52d3747f01085ff7b5ddfcde870

    • Size

      325KB

    • MD5

      040ef52d3747f01085ff7b5ddfcde870

    • SHA1

      3cb68cda145843e470ef7641dc0968f6e8cd4324

    • SHA256

      227cf591401173bb3f71c8bcb777f1be94cf1b058f14f6058fe8b7a6397522e8

    • SHA512

      ceeb7832e1f4956e6703793b29538ff128eb32c09996ecef24a102fdc5398fe084770c2fcf5350f1c4d971ab40223637d23cbeb99e7ec55fcc8986ffc9a8eea1

    • SSDEEP

      6144:WW+Tk7wAOqOZ3c5aZQL6O7n8HFXLjy4iWdhXLfmTZRF/riIk5i4E8aKDi+:wZM5aM14phXLfi/5aK4i+

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks