General

  • Target

    JaffaCakes118_9d78a6ec539d506682b52a23563600bb

  • Size

    512KB

  • Sample

    250407-cqc28axn17

  • MD5

    9d78a6ec539d506682b52a23563600bb

  • SHA1

    24616d48032dbe0b81f52d86eced003ab20450fe

  • SHA256

    43387531177cac41eeef73984168181bd6fff9eff55ca5586c48209762ffa1dd

  • SHA512

    6aa8ad1bcc2516bc8b911f6fd52020dd4adc1d61e52866941379a626168573d933baa99d020701e498a147c0bee28d6f04e1682583b2f188f09dfe776ae2539f

  • SSDEEP

    6144:WfcSoop6wfCGCY+t38SFYib0MZ/ajdf8lJSLl4wG0rzCOFYHA6B1UmNpmA1:WfCop9C1MSlb2gSSdCmOuHA6BdOA1

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

remote

C2

127.0.0.1:999

Mutex

3F07TM5U6W5D11

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    cybergate

Targets

    • Target

      JaffaCakes118_9d78a6ec539d506682b52a23563600bb

    • Size

      512KB

    • MD5

      9d78a6ec539d506682b52a23563600bb

    • SHA1

      24616d48032dbe0b81f52d86eced003ab20450fe

    • SHA256

      43387531177cac41eeef73984168181bd6fff9eff55ca5586c48209762ffa1dd

    • SHA512

      6aa8ad1bcc2516bc8b911f6fd52020dd4adc1d61e52866941379a626168573d933baa99d020701e498a147c0bee28d6f04e1682583b2f188f09dfe776ae2539f

    • SSDEEP

      6144:WfcSoop6wfCGCY+t38SFYib0MZ/ajdf8lJSLl4wG0rzCOFYHA6B1UmNpmA1:WfCop9C1MSlb2gSSdCmOuHA6BdOA1

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.