General

  • Target

    JaffaCakes118_3d873e50d0c13581d5399c5657e496d5

  • Size

    373KB

  • Sample

    250127-jw9fyazpap

  • MD5

    3d873e50d0c13581d5399c5657e496d5

  • SHA1

    958ef9a514de29f57ed340048d3d3e88ec84818e

  • SHA256

    e349a0e8ad369caf2fc59ac06f70fcd2a03e22402e9477819f512eb31f9f5880

  • SHA512

    e540859c134316e8c524daee3c8d2cc56e7d36db887c62ce08d025e3c041f4591628db970c658516a895b91138f760df4064300b083a5174a17bcccd25610992

  • SSDEEP

    6144:3ik5JGmrpQsK3RD2u270jupCJsCxCAg7f+SGHtsgaL:3ixZ2zkPaCx9KfpGNsv

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

zakacinho.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    spynet

  • install_file

    explorer.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_3d873e50d0c13581d5399c5657e496d5

    • Size

      373KB

    • MD5

      3d873e50d0c13581d5399c5657e496d5

    • SHA1

      958ef9a514de29f57ed340048d3d3e88ec84818e

    • SHA256

      e349a0e8ad369caf2fc59ac06f70fcd2a03e22402e9477819f512eb31f9f5880

    • SHA512

      e540859c134316e8c524daee3c8d2cc56e7d36db887c62ce08d025e3c041f4591628db970c658516a895b91138f760df4064300b083a5174a17bcccd25610992

    • SSDEEP

      6144:3ik5JGmrpQsK3RD2u270jupCJsCxCAg7f+SGHtsgaL:3ixZ2zkPaCx9KfpGNsv

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks