General

  • Target

    JaffaCakes118_1f456989040c239212afbe192f727246

  • Size

    397KB

  • Sample

    250124-jel93sxkfv

  • MD5

    1f456989040c239212afbe192f727246

  • SHA1

    f4831516a50bc973050555b8cf82c44506dfffaf

  • SHA256

    17e82497609cd4b6287051236a28285f250850eceb83efa420424e27aebc9120

  • SHA512

    52a555fcc5b269450b60966482b4c3cb0811c8654d70ee49a8fba18b5c633cdb1d6bb61a75ebe706fea0102947f4605c23b4dcbcf7bc7d1883227d24c950ad58

  • SSDEEP

    12288:BqheWG5GeRH0+0KyhxW0Z3ht+FdrZsPdMaSn:BGG5fRHVn0Z3fC1sPdM/n

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Fed

C2

f3m.no-ip.info:1982

Mutex

UR2773UPSX11WQ

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Win

  • install_file

    Windowsupdate.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    abc123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      Install.exe

    • Size

      7.3MB

    • MD5

      90e0374d53bd364405bf1464ed43aa0d

    • SHA1

      b137ae0ba73dade97e754e794b8482bd140503bd

    • SHA256

      d6568832283a943d8cfd607efbf7e8036388ec457c2193a4525115718a2b5b8a

    • SHA512

      23aa834cbb6b02ebb8011a6d27dbd8fe68a3eca1cba5a5ffd05eb794685edebf6fae19a20b8e93759c290677b5650e792a49c5cfed1867b55b3f42c5045cfaf8

    • SSDEEP

      12288:wraNNP1wmNfnkh9LJMFr2RnvXbdrC/bT5eVZOHE:/NIl1rdq0m

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks