General

  • Target

    JaffaCakes118_9c0f962e1a16fca26ebf90bf01293196

  • Size

    564KB

  • Sample

    250406-v1q1yaxj19

  • MD5

    9c0f962e1a16fca26ebf90bf01293196

  • SHA1

    6ab78397dd6fdf88b2c89527599c2992dd24f173

  • SHA256

    e88f2865a58a26502f715534e87e9ec1a3aadf06511c300862a7bc5ed4a72741

  • SHA512

    5778cdf48f07eca136db00c68527c17b9e1db42b01a260aee5fb686d77a2b0a69a9e2cd1ddf00900080f73ff6b2374f86224f6a7571c9756beec8c5f3d353972

  • SSDEEP

    12288:YKrQdOS4176aTIzUAAmUHyRvynwvX3s06wGWxdpy:vQdA8aTIzUATUH2anyHswV7Q

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

victima

C2

thekingomar.zapto.org:88

Mutex

***MUTEX12***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

Extracted

Family

latentbot

C2

thekingomar.zapto.org

Targets

    • Target

      JaffaCakes118_9c0f962e1a16fca26ebf90bf01293196

    • Size

      564KB

    • MD5

      9c0f962e1a16fca26ebf90bf01293196

    • SHA1

      6ab78397dd6fdf88b2c89527599c2992dd24f173

    • SHA256

      e88f2865a58a26502f715534e87e9ec1a3aadf06511c300862a7bc5ed4a72741

    • SHA512

      5778cdf48f07eca136db00c68527c17b9e1db42b01a260aee5fb686d77a2b0a69a9e2cd1ddf00900080f73ff6b2374f86224f6a7571c9756beec8c5f3d353972

    • SSDEEP

      12288:YKrQdOS4176aTIzUAAmUHyRvynwvX3s06wGWxdpy:vQdA8aTIzUATUH2anyHswV7Q

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks