General

  • Target

    JaffaCakes118_3ddb4c6beca77ca96e29bb57ac0bcf4a

  • Size

    468KB

  • Sample

    250127-kndvqszpgt

  • MD5

    3ddb4c6beca77ca96e29bb57ac0bcf4a

  • SHA1

    7352d84f7ec718562926cab62bd6afea072eb510

  • SHA256

    12f40c901eb26968f6528915a6198e5ae6c48afb52a841e8dae6372db08d6b49

  • SHA512

    9ec9e61ad2e98907d0b26876bbfe2429c442b68a930d0dbe5a432373fd5c35c060ab6bfa1f3bf2968566ddebda80bba8eeb7c4c93c886f5c77b21eca8fc2441e

  • SSDEEP

    12288:fgYD1u+uqly6paZBlkuKrIvRRoPznkwzqm8YWp:fd1/VGBlEUo7nHqTHp

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

remote

C2

24.1.244.23:3737

Mutex

3KBX25MXV62EH6

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Microsoft

  • install_file

    Updater.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_3ddb4c6beca77ca96e29bb57ac0bcf4a

    • Size

      468KB

    • MD5

      3ddb4c6beca77ca96e29bb57ac0bcf4a

    • SHA1

      7352d84f7ec718562926cab62bd6afea072eb510

    • SHA256

      12f40c901eb26968f6528915a6198e5ae6c48afb52a841e8dae6372db08d6b49

    • SHA512

      9ec9e61ad2e98907d0b26876bbfe2429c442b68a930d0dbe5a432373fd5c35c060ab6bfa1f3bf2968566ddebda80bba8eeb7c4c93c886f5c77b21eca8fc2441e

    • SSDEEP

      12288:fgYD1u+uqly6paZBlkuKrIvRRoPznkwzqm8YWp:fd1/VGBlEUo7nHqTHp

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks