General

  • Target

    JaffaCakes118_a240373bfb2c70f9bf230245ac01c807

  • Size

    824KB

  • Sample

    250408-3x742svkv2

  • MD5

    a240373bfb2c70f9bf230245ac01c807

  • SHA1

    6cfe7af518f2b30822c83e2aff0b125264d83d4d

  • SHA256

    0f8384b3a01c7d18fc6fa15e06a9117393c13d490065ec4d30654e74fc1529ca

  • SHA512

    d5990da35e2b6c6f3d2a303059cb65378c2c10aa449f21f1ad205c071a3de594c4364fe3fac89dcdbfdc0b76ac7baa50cdf92a5e2940ecc3b5c265695901a915

  • SSDEEP

    12288:5Wtz1iBzGPhkMiI7L8R1rzcTYQAln0LIZtUsZGmzM3S48GhxnL9wUfaK7/7ayTg2:Pz47uHl3lnaeWT/ph2

Malware Config

Extracted

Family

cybergate

Version

v1.07.0

Botnet

remote

C2

bicrav.dyndns.biz:28960

Mutex

MXNH2HGH56W876

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    win32

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Sorry, your current machine doesn't work.

  • message_box_title

    Msn Crack v2.0

  • password

    windivx

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_a240373bfb2c70f9bf230245ac01c807

    • Size

      824KB

    • MD5

      a240373bfb2c70f9bf230245ac01c807

    • SHA1

      6cfe7af518f2b30822c83e2aff0b125264d83d4d

    • SHA256

      0f8384b3a01c7d18fc6fa15e06a9117393c13d490065ec4d30654e74fc1529ca

    • SHA512

      d5990da35e2b6c6f3d2a303059cb65378c2c10aa449f21f1ad205c071a3de594c4364fe3fac89dcdbfdc0b76ac7baa50cdf92a5e2940ecc3b5c265695901a915

    • SSDEEP

      12288:5Wtz1iBzGPhkMiI7L8R1rzcTYQAln0LIZtUsZGmzM3S48GhxnL9wUfaK7/7ayTg2:Pz47uHl3lnaeWT/ph2

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks