General

  • Target

    JaffaCakes118_3fea44e495b32d04549dc2fa051499cb

  • Size

    297KB

  • Sample

    250127-qg3heazmfz

  • MD5

    3fea44e495b32d04549dc2fa051499cb

  • SHA1

    50721ac307bf2b9b98ab79e39c63c6515c0adf2a

  • SHA256

    85be334a5b0ce6ce5746a922329acb72a8bd425fb1695744e9e6254b89d6731a

  • SHA512

    23dbb7b8e6e7fde579b45a894d37f0b3b39429a342ab147cd73e3be9d36cbe4438ffb9700027eace978419561c575cb6de77655a03b7e0146247b044ff527c54

  • SSDEEP

    6144:YnelHD3h3LZrtNCAmYThWUYQbEgwzylWJP1fkoUXTSWhS:Ye5ZL7NCAmYFMnMWJCoFx

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Test 1

C2

omexi.no-ip.org:999

omexi.no-ip.org:4444

Mutex

CT567B84G8HQ86

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Test 3 !!

  • message_box_title

    Jordi

  • password

    78988

Targets

    • Target

      JaffaCakes118_3fea44e495b32d04549dc2fa051499cb

    • Size

      297KB

    • MD5

      3fea44e495b32d04549dc2fa051499cb

    • SHA1

      50721ac307bf2b9b98ab79e39c63c6515c0adf2a

    • SHA256

      85be334a5b0ce6ce5746a922329acb72a8bd425fb1695744e9e6254b89d6731a

    • SHA512

      23dbb7b8e6e7fde579b45a894d37f0b3b39429a342ab147cd73e3be9d36cbe4438ffb9700027eace978419561c575cb6de77655a03b7e0146247b044ff527c54

    • SSDEEP

      6144:YnelHD3h3LZrtNCAmYThWUYQbEgwzylWJP1fkoUXTSWhS:Ye5ZL7NCAmYFMnMWJCoFx

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks