General

  • Target

    JaffaCakes118_156db6dbbce07b24b6be457a3a232c93

  • Size

    818KB

  • Sample

    250123-kbtena1qcw

  • MD5

    156db6dbbce07b24b6be457a3a232c93

  • SHA1

    1feb4fdd1a7729e97f54e99eff02ba8bc7d67953

  • SHA256

    3c11e9d246c283b45e3d0d993095a622bab0679fcdc4a4e70c55bbb350338f39

  • SHA512

    fda86580c3d2ef8a591e3a1973a3811efec97551f099f63956ddd56646f0d4710701e58147e2f93a68175f925c62269b978a7e0e944e6d7e2442e662e60d2836

  • SSDEEP

    24576:KtB7LXak1sSg0SXMvb2sAh6GsPn3GOPZtEeBE:KtB70

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Cyber

C2

127.0.0.1:3737

servicepub.no-ip.biz:3737

Mutex

57147W8231KBAY

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_156db6dbbce07b24b6be457a3a232c93

    • Size

      818KB

    • MD5

      156db6dbbce07b24b6be457a3a232c93

    • SHA1

      1feb4fdd1a7729e97f54e99eff02ba8bc7d67953

    • SHA256

      3c11e9d246c283b45e3d0d993095a622bab0679fcdc4a4e70c55bbb350338f39

    • SHA512

      fda86580c3d2ef8a591e3a1973a3811efec97551f099f63956ddd56646f0d4710701e58147e2f93a68175f925c62269b978a7e0e944e6d7e2442e662e60d2836

    • SSDEEP

      24576:KtB7LXak1sSg0SXMvb2sAh6GsPn3GOPZtEeBE:KtB70

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks