General

  • Target

    JaffaCakes118_21348f75c8ab57359b357f049cea07a5

  • Size

    488KB

  • Sample

    250223-rvrhqssmt8

  • MD5

    21348f75c8ab57359b357f049cea07a5

  • SHA1

    a464d06e928b88d92eca9c619b1ab1c560d94b7f

  • SHA256

    376b8343276d0861b065eae8f3f87ebf85bd0395b1fc7242e0d3f21848b4a0c7

  • SHA512

    ea3e97ce0080c48d2a00301e61d638019922f5687c67d82f66e591efbea17935dd2ffb08f673ff89b311e6c220ddf136239bb940d27cd6bae81b3ab879cdbad7

  • SSDEEP

    12288:7bjeDFvL2IATQKW1amIcKDC+DP5NpHBoRpXFMnaSuYuJpQbn:7MFvLrKIRMDC+DP5NPuWnBuYuJar

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

biz

C2

q7audi.no-ip.info:511

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    effewefwefewfff

  • install_file

    qdwaddrdd.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

Targets

    • Target

      crack2013.exe

    • Size

      140KB

    • MD5

      7282ad47419c55f6e560a68d16dee2c4

    • SHA1

      113b4bd76ebd874304728d5a879b1fb06058140e

    • SHA256

      a4f862066ca5fae36faef0167f2a919637797869c6b338b1ec3e0f9a56af21f1

    • SHA512

      4f576308f64895c6cc8ac75485ddf8dacffdf5fc85318e8d8fa3bc4d1e3d636c0686106d5b0c3cf5b0dc88df4b5984f535a6a8a0b6f25649d05dce1df2f9fadc

    • SSDEEP

      3072:c4yXTm8fD3XhefvpaFoAePQ3z13XPDo6bSb0sifsI62JB4O:EYxwh7Sb2LJBn

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      setup 2.1.EXE

    • Size

      500KB

    • MD5

      e53c30f778360db291125cec65c9a8d8

    • SHA1

      5fd7b0f658658563a77146231644dccc8a7d54e3

    • SHA256

      0b725cdce3378728d543c99aff3a3155b4be29a53a07863bcd56f78e5b43dbfe

    • SHA512

      574ebefae0660a8a0dd52ceffa801b60ad293e8b5ad1aa3646ffb3ecc2ee458dd963df79489c2e90a74385c6562d7c5ddc44f6aeabe1b8de832ae8ebe709cf05

    • SSDEEP

      12288:x/edy90tflRYWN5l5R2HHCpsWcMMHnsBIhfxjegGu/z80y9m:ayKmWNr5RICpswMHAIlxjeY/zPy9m

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks