General

  • Target

    JaffaCakes118_172869ebef1f3f9e1a127664748a5a17

  • Size

    725KB

  • Sample

    250123-pjd26a1mgl

  • MD5

    172869ebef1f3f9e1a127664748a5a17

  • SHA1

    c521e0823053766f2ba3c1d0db263be0431609f6

  • SHA256

    ce050f82d51779b4dec18d38fe8e16d152b37a7b31382e7b5a4563242c93b101

  • SHA512

    daa0cd0eac81f803289c5d1f1132d193b02fc8c25a17175063c5fc981b9da27392774f37df17ffbd4308388f50cb6827c4dcb358d9024f27b34df1f7f785e06e

  • SSDEEP

    12288:Q4uPlcPwDF448CR9EA5Q+7nwFY0jAF6AkFBP6IxvfSEofkI:QJlcIDF2G9E9+7nw5y6JFBPnaEeR

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

simone

C2

audi2010.serveftp.com:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    5

  • ftp_password

    bonjour

  • ftp_port

    21

  • ftp_server

    ftp.drivehq.com

  • ftp_username

    cyclone9276

  • injected_process

    explorer.exe

  • install_dir

    windl32

  • install_file

    win32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    true

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    bonjour

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_172869ebef1f3f9e1a127664748a5a17

    • Size

      725KB

    • MD5

      172869ebef1f3f9e1a127664748a5a17

    • SHA1

      c521e0823053766f2ba3c1d0db263be0431609f6

    • SHA256

      ce050f82d51779b4dec18d38fe8e16d152b37a7b31382e7b5a4563242c93b101

    • SHA512

      daa0cd0eac81f803289c5d1f1132d193b02fc8c25a17175063c5fc981b9da27392774f37df17ffbd4308388f50cb6827c4dcb358d9024f27b34df1f7f785e06e

    • SSDEEP

      12288:Q4uPlcPwDF448CR9EA5Q+7nwFY0jAF6AkFBP6IxvfSEofkI:QJlcIDF2G9E9+7nw5y6JFBPnaEeR

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks