General

  • Target

    JaffaCakes118_128bd7bb58574ae5b53c18e47b66e599

  • Size

    741KB

  • Sample

    250221-pfngessjer

  • MD5

    128bd7bb58574ae5b53c18e47b66e599

  • SHA1

    a936215b35cc3bf72dbc846aaeb592efab18e040

  • SHA256

    e7bef8dd973a2dce97cada81915ffd00675b2f3dfc20ea65151dbb9eaf879b47

  • SHA512

    44410a55722ecf2e390246704ea4b0d942cb0be7d721825aabffdb921f60600d40477a2bc4c36c822eb3906db13711d23a6e603af70713428d24ae25507f16d2

  • SSDEEP

    12288:xKyxGAkD0o1O3LA+DXttekLDy2Ww6zWXDEOk6HKE1xmgmDRtHd8dK/lGRgOUqmqz:4yDkYosHdvDNWwQ4D26hSgoRgdK/cRgm

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

abdelellah.zapto.org:228

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Crystall

  • install_file

    theme.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_128bd7bb58574ae5b53c18e47b66e599

    • Size

      741KB

    • MD5

      128bd7bb58574ae5b53c18e47b66e599

    • SHA1

      a936215b35cc3bf72dbc846aaeb592efab18e040

    • SHA256

      e7bef8dd973a2dce97cada81915ffd00675b2f3dfc20ea65151dbb9eaf879b47

    • SHA512

      44410a55722ecf2e390246704ea4b0d942cb0be7d721825aabffdb921f60600d40477a2bc4c36c822eb3906db13711d23a6e603af70713428d24ae25507f16d2

    • SSDEEP

      12288:xKyxGAkD0o1O3LA+DXttekLDy2Ww6zWXDEOk6HKE1xmgmDRtHd8dK/lGRgOUqmqz:4yDkYosHdvDNWwQ4D26hSgoRgdK/cRgm

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks