General

  • Target

    JaffaCakes118_11715b41c0f4dddb316ed5c16026c35e

  • Size

    220KB

  • Sample

    250221-kg2m8azkt7

  • MD5

    11715b41c0f4dddb316ed5c16026c35e

  • SHA1

    97868a46add17013fa73954bd937d570d3d05337

  • SHA256

    8e1ce19aa564b7dae08d84b7d3cb7849e9171bfa173795f12f53c96d4663c49c

  • SHA512

    f48011742a08685e8b4d3facc77015b4979dbf164a0d4ee1b25786373fa992e4e13db466c936f2a93e96810f55b4be97931fe5e990c1f6980296af5cb76a14e6

  • SSDEEP

    6144:BGiLcQ97kJkS4nrx+7cX69NG4jwyvch7Ek4hXpIfs67TelAy:X6uN+7cK9PwyvI7Ek4hXZ6velAy

Malware Config

Extracted

Family

cybergate

Version

2.2

Botnet

Victim

C2

92.69.255.47:2754

Mutex

m_Listener

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    kaas

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_11715b41c0f4dddb316ed5c16026c35e

    • Size

      220KB

    • MD5

      11715b41c0f4dddb316ed5c16026c35e

    • SHA1

      97868a46add17013fa73954bd937d570d3d05337

    • SHA256

      8e1ce19aa564b7dae08d84b7d3cb7849e9171bfa173795f12f53c96d4663c49c

    • SHA512

      f48011742a08685e8b4d3facc77015b4979dbf164a0d4ee1b25786373fa992e4e13db466c936f2a93e96810f55b4be97931fe5e990c1f6980296af5cb76a14e6

    • SSDEEP

      6144:BGiLcQ97kJkS4nrx+7cX69NG4jwyvch7Ek4hXpIfs67TelAy:X6uN+7cK9PwyvI7Ek4hXZ6velAy

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks