General

  • Target

    JaffaCakes118_3cae5e398555300ad483dd1e25688e51

  • Size

    298KB

  • Sample

    250127-gx4wqswmbq

  • MD5

    3cae5e398555300ad483dd1e25688e51

  • SHA1

    4d88f36e41b557366b30f4ce68a9b288246464b5

  • SHA256

    35252cc9954ee4f269faa7826d2a483925faac3b12321d7901283c4d6e0ff1b8

  • SHA512

    b6037480a8e4a30e254ee494a0b627bfe5ed6de61312b710320243fe03a1b54e1d4b7c988dc1ea6f0a6ab4c84576c7863afc8f62913c195fec14d7ee8b8c155d

  • SSDEEP

    6144:E3vS4lEm0c05B3JyN24DlwoUQEtUYOhZmI65DX+yZ3YfpNstnrpsf:CK5m0/B4x/U3t0ZmI6dX+03Y7strpm

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

KuRBaN

C2

denemetrojan.no-ip.org:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Dlll32.exe

  • install_file

    iexplorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_3cae5e398555300ad483dd1e25688e51

    • Size

      298KB

    • MD5

      3cae5e398555300ad483dd1e25688e51

    • SHA1

      4d88f36e41b557366b30f4ce68a9b288246464b5

    • SHA256

      35252cc9954ee4f269faa7826d2a483925faac3b12321d7901283c4d6e0ff1b8

    • SHA512

      b6037480a8e4a30e254ee494a0b627bfe5ed6de61312b710320243fe03a1b54e1d4b7c988dc1ea6f0a6ab4c84576c7863afc8f62913c195fec14d7ee8b8c155d

    • SSDEEP

      6144:E3vS4lEm0c05B3JyN24DlwoUQEtUYOhZmI65DX+yZ3YfpNstnrpsf:CK5m0/B4x/U3t0ZmI6dX+03Y7strpm

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks