General

  • Target

    JaffaCakes118_06f594caf550e0c7f542ac203659b5fd

  • Size

    432KB

  • Sample

    250121-yadjpsxqd1

  • MD5

    06f594caf550e0c7f542ac203659b5fd

  • SHA1

    4679dd51b85843ecb518b60efd8b11a8283ea0d6

  • SHA256

    75f2f7c272a73408206daf36ad6e1504c883d0471008cada1a8b750c89100dc3

  • SHA512

    18ee280526c98ca501c55e7cd3bd6e545467688f91234402697a662733b218ac3c8cf8187de8458a3b959e53a92e0d567f06f15c86cf54b0e63785b2c3ea950a

  • SSDEEP

    6144:2ylJa6HTVPafnz/OO6oH1K3HkdsPnvCYjRh4j2luXzfGG3InlzvbTFNsq:nTfH2nz/OOVaHkLYjRh4jauXCG3wlbZ

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

saaaaaaaaaaaaaaaaaaaaaaaad

C2

ranoosh.no-ip.biz:75

Mutex

1HKFCQU4732236

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    system

  • install_file

    system.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_06f594caf550e0c7f542ac203659b5fd

    • Size

      432KB

    • MD5

      06f594caf550e0c7f542ac203659b5fd

    • SHA1

      4679dd51b85843ecb518b60efd8b11a8283ea0d6

    • SHA256

      75f2f7c272a73408206daf36ad6e1504c883d0471008cada1a8b750c89100dc3

    • SHA512

      18ee280526c98ca501c55e7cd3bd6e545467688f91234402697a662733b218ac3c8cf8187de8458a3b959e53a92e0d567f06f15c86cf54b0e63785b2c3ea950a

    • SSDEEP

      6144:2ylJa6HTVPafnz/OO6oH1K3HkdsPnvCYjRh4j2luXzfGG3InlzvbTFNsq:nTfH2nz/OOVaHkLYjRh4jauXCG3wlbZ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks