General

  • Target

    JaffaCakes118_1d6ed3c17b19e631756f7ef4f2dc83ea

  • Size

    916KB

  • Sample

    250124-drpm3syjan

  • MD5

    1d6ed3c17b19e631756f7ef4f2dc83ea

  • SHA1

    4c321977743ce11212cf84b233d1e5ebdc899d5a

  • SHA256

    72e7b85cca162567ef13c20a66092e801047a7f223ceba6c6e809bd69780fde0

  • SHA512

    fc37e289b3fa40f6843f62bca29e2b56c08f85affb4e7cd7f5c6004b760b7ab0054671db2fcbf47da3a6d66e7735d07416fbd1fbc698c716f0bccdeb0a55940a

  • SSDEEP

    24576:JYcFMJLhVPZByLCbf5dlYJOrYV25r3GExmbsc3zLO6:JYvjPiLCbf/logr3asC/z

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

SFX ENGENHARIA PARA MINAS K SFX ENGENHARIA PARA MINAS K

C2

textefeliz.no-ip.org:2000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    msnmsgr.exe

  • install_dir

    Microsoft

  • install_file

    google.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_1d6ed3c17b19e631756f7ef4f2dc83ea

    • Size

      916KB

    • MD5

      1d6ed3c17b19e631756f7ef4f2dc83ea

    • SHA1

      4c321977743ce11212cf84b233d1e5ebdc899d5a

    • SHA256

      72e7b85cca162567ef13c20a66092e801047a7f223ceba6c6e809bd69780fde0

    • SHA512

      fc37e289b3fa40f6843f62bca29e2b56c08f85affb4e7cd7f5c6004b760b7ab0054671db2fcbf47da3a6d66e7735d07416fbd1fbc698c716f0bccdeb0a55940a

    • SSDEEP

      24576:JYcFMJLhVPZByLCbf5dlYJOrYV25r3GExmbsc3zLO6:JYvjPiLCbf/logr3asC/z

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks