General

  • Target

    JaffaCakes118_6de62ba862a3a7aed2d5f6bd8a18315d

  • Size

    548KB

  • Sample

    250313-a2wycszm13

  • MD5

    6de62ba862a3a7aed2d5f6bd8a18315d

  • SHA1

    ac00605f11e6dbf1f0707aac91b455d98154f3d7

  • SHA256

    dc0434d23bb82fd6e1febf15dfb55e66a4fad1c0168f3ad0b98df981fb05ea99

  • SHA512

    2770ad5267dacbc954475253971d92c05d73a7fa85fd25e5c7f659f9578b61b7977454ef66c89e00a91b47887e6daeff0f4fd3f7853db5f40e27e31c89c05f97

  • SSDEEP

    12288:XLdlCMudvYpoeX45pBxwg0J9VTmV7OOuH2uRRd4GkK7jncxzMocosMimYuE:XxIbvszX45pQg0xT4uHPaYdMibuE

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

Cyber

C2

servicepub.no-ip.biz:3737

127.0.0.1:3737

Mutex

N7YE3FAU44JJB2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    false

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Targets

    • Target

      JaffaCakes118_6de62ba862a3a7aed2d5f6bd8a18315d

    • Size

      548KB

    • MD5

      6de62ba862a3a7aed2d5f6bd8a18315d

    • SHA1

      ac00605f11e6dbf1f0707aac91b455d98154f3d7

    • SHA256

      dc0434d23bb82fd6e1febf15dfb55e66a4fad1c0168f3ad0b98df981fb05ea99

    • SHA512

      2770ad5267dacbc954475253971d92c05d73a7fa85fd25e5c7f659f9578b61b7977454ef66c89e00a91b47887e6daeff0f4fd3f7853db5f40e27e31c89c05f97

    • SSDEEP

      12288:XLdlCMudvYpoeX45pBxwg0J9VTmV7OOuH2uRRd4GkK7jncxzMocosMimYuE:XxIbvszX45pQg0xT4uHPaYdMibuE

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.