General

  • Target

    JaffaCakes118_074ee6b0085a5b2cdde9aa03b61ddb95

  • Size

    354KB

  • Sample

    250219-x4gb1sypz7

  • MD5

    074ee6b0085a5b2cdde9aa03b61ddb95

  • SHA1

    79c9234c7d45b698a69ca6a6a4955e24fa1f6b71

  • SHA256

    ecb53379323a946a52a7cf2b64fd2cbb6febf3fb9da81a296588910f618a17a3

  • SHA512

    5396b91b408ed81a624c023edd17d04f714b7e59067f8c25c99bc24b8e07183e8426c7ab8a27f59c54c31d24705a47afed3a6f1ed1f2f8787e298d7acb03ff8a

  • SSDEEP

    6144:p4RYIBemxhfDKxsY4HuOjIgf8SNG+ps9O0BGd71A+mILLlSTc7So1em06hcd:pBIImxhfDKSY4HuOjD8C32IZA+rvlWoJ

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

dexter

C2

soq.zapto.org:8778

soq.zapto.org:6778

Mutex

Microsoft

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Google

  • install_file

    rundll32.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    054409

  • regkey_hkcu

    HTC

  • regkey_hklm

    Windows Media Center key

Targets

    • Target

      JaffaCakes118_074ee6b0085a5b2cdde9aa03b61ddb95

    • Size

      354KB

    • MD5

      074ee6b0085a5b2cdde9aa03b61ddb95

    • SHA1

      79c9234c7d45b698a69ca6a6a4955e24fa1f6b71

    • SHA256

      ecb53379323a946a52a7cf2b64fd2cbb6febf3fb9da81a296588910f618a17a3

    • SHA512

      5396b91b408ed81a624c023edd17d04f714b7e59067f8c25c99bc24b8e07183e8426c7ab8a27f59c54c31d24705a47afed3a6f1ed1f2f8787e298d7acb03ff8a

    • SSDEEP

      6144:p4RYIBemxhfDKxsY4HuOjIgf8SNG+ps9O0BGd71A+mILLlSTc7So1em06hcd:pBIImxhfDKSY4HuOjD8C32IZA+rvlWoJ

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks