Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_84abdc4b73112e987756adb882d0a06a

  • Size

    287KB

  • Sample

    250321-zgk3sssq14

  • MD5

    84abdc4b73112e987756adb882d0a06a

  • SHA1

    31c45c7533afc801db95b5920046261c6ebbd2d5

  • SHA256

    9ae60a225278bec26d9301f871c1cb5edd19d337154bfa67cd948229d2d3576c

  • SHA512

    6c5df0d5a9f89b0a26b572671f87a6195b2b4ecabe97efa9de3887b0dbdd3a9bce0ff4a8a1390995fa976d329cf0e0cc41f7634765d253292cb1b779c5dc4106

  • SSDEEP

    6144:7Dk3+8HI6OgRb16EjQY5XZQgruY4UxqCr3BjgQg3F:7DkO8Hrrp6RuZLd+Cr3mQgV

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

VIC

C2

amokianer.no-ip.info:3333

Mutex

55JRIBR68P17D2

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    update.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    marcel86

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_84abdc4b73112e987756adb882d0a06a

    • Size

      287KB

    • MD5

      84abdc4b73112e987756adb882d0a06a

    • SHA1

      31c45c7533afc801db95b5920046261c6ebbd2d5

    • SHA256

      9ae60a225278bec26d9301f871c1cb5edd19d337154bfa67cd948229d2d3576c

    • SHA512

      6c5df0d5a9f89b0a26b572671f87a6195b2b4ecabe97efa9de3887b0dbdd3a9bce0ff4a8a1390995fa976d329cf0e0cc41f7634765d253292cb1b779c5dc4106

    • SSDEEP

      6144:7Dk3+8HI6OgRb16EjQY5XZQgruY4UxqCr3BjgQg3F:7DkO8Hrrp6RuZLd+Cr3mQgV

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks