General

  • Target

    JaffaCakes118_6a819845b302159c00b1a0da5d7402b1

  • Size

    575KB

  • Sample

    250131-qdyeaawnf1

  • MD5

    6a819845b302159c00b1a0da5d7402b1

  • SHA1

    e82624b44aa3ae2489c10e7f7214e35c57173b31

  • SHA256

    83b3743f0ba030307a21d982dbffe010b1fcbc704c25c2246796bba66211c9cc

  • SHA512

    16298aff370901d7acb1521a1701a3050c262a918334131a4e1742f618e52a439e1a5e17d36ad9250fbf385ba7ceb0277dcc19458c71989722fc120f24dbb213

  • SSDEEP

    12288:biV03YN/8A5i9ZfZivfpOdqd/rxSLXHrEqUJnlt9BfqyKTTmhpb:Gku0ZYvKYpb

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Hacked

C2

scriptedgate.no-ip.org:81

Mutex

5RIGP5LGY47G66

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_6a819845b302159c00b1a0da5d7402b1

    • Size

      575KB

    • MD5

      6a819845b302159c00b1a0da5d7402b1

    • SHA1

      e82624b44aa3ae2489c10e7f7214e35c57173b31

    • SHA256

      83b3743f0ba030307a21d982dbffe010b1fcbc704c25c2246796bba66211c9cc

    • SHA512

      16298aff370901d7acb1521a1701a3050c262a918334131a4e1742f618e52a439e1a5e17d36ad9250fbf385ba7ceb0277dcc19458c71989722fc120f24dbb213

    • SSDEEP

      12288:biV03YN/8A5i9ZfZivfpOdqd/rxSLXHrEqUJnlt9BfqyKTTmhpb:Gku0ZYvKYpb

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks