General

  • Target

    JaffaCakes118_08b6ebf7fec049e9ba2ac2c4ca6bfc0a

  • Size

    965KB

  • Sample

    250220-bb5m9avlw7

  • MD5

    08b6ebf7fec049e9ba2ac2c4ca6bfc0a

  • SHA1

    355ce513c1c0093c57c82406460157a94c1d4e6c

  • SHA256

    ed672bff6e06847a1667b764e776bef664286cb5a67e366db89bbc97025c4062

  • SHA512

    44fe1780ab238a08dfdca9473af29edb2162b76385571cd1eab167fa0fe0aaf1d0febbf73395d23957c5c4829f593a084efdc344a9ac9dab721fdf4df0bdf9e9

  • SSDEEP

    24576:ARmJkcoQricOIQxiZY1iaEy7W4bevfero0zK:1JZoQrbTFZY1iaE54bevfAzK

Malware Config

Extracted

Family

cybergate

Version

v1.02.1

Botnet

xXxNubxXx

C2

taliban.no-ip.org:81

Mutex

Pluguin

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    System32

  • install_file

    wuauclt.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.

  • message_box_title

    LAMMER

  • password

    123

Targets

    • Target

      JaffaCakes118_08b6ebf7fec049e9ba2ac2c4ca6bfc0a

    • Size

      965KB

    • MD5

      08b6ebf7fec049e9ba2ac2c4ca6bfc0a

    • SHA1

      355ce513c1c0093c57c82406460157a94c1d4e6c

    • SHA256

      ed672bff6e06847a1667b764e776bef664286cb5a67e366db89bbc97025c4062

    • SHA512

      44fe1780ab238a08dfdca9473af29edb2162b76385571cd1eab167fa0fe0aaf1d0febbf73395d23957c5c4829f593a084efdc344a9ac9dab721fdf4df0bdf9e9

    • SSDEEP

      24576:ARmJkcoQricOIQxiZY1iaEy7W4bevfero0zK:1JZoQrbTFZY1iaE54bevfAzK

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks