General

  • Target

    JaffaCakes118_a9b47e9c482c8caa220e5eb28c61d503

  • Size

    288KB

  • Sample

    250410-mwb28ayxhs

  • MD5

    a9b47e9c482c8caa220e5eb28c61d503

  • SHA1

    866697a1bb2c42d8dfd56482f5a1eb22ce91e1a1

  • SHA256

    9f58e624b9684fa5cef2a10c38dafe5edafa60e791f32ac14b6e5514f7d61be5

  • SHA512

    8f0a55567962d4514abe2e5288e368c82acd22c5fa86cd737da0ca6562db806ad52bec03c231c5b73cd74f9f3685d117185fdd6b26ec76bf8c1422608c9f1eb8

  • SSDEEP

    6144:yQeZ1Ul6Doyq8ioUZ1tJfVaDTAQ5YSv4l5tkRKMU+J3av1DGMi:yQeHGqWpLDGTAltbYO6

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

remote

C2

humba234.hopto.org:82

Mutex

Q2240S48E6O720

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    C:\Windows\System32\

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_a9b47e9c482c8caa220e5eb28c61d503

    • Size

      288KB

    • MD5

      a9b47e9c482c8caa220e5eb28c61d503

    • SHA1

      866697a1bb2c42d8dfd56482f5a1eb22ce91e1a1

    • SHA256

      9f58e624b9684fa5cef2a10c38dafe5edafa60e791f32ac14b6e5514f7d61be5

    • SHA512

      8f0a55567962d4514abe2e5288e368c82acd22c5fa86cd737da0ca6562db806ad52bec03c231c5b73cd74f9f3685d117185fdd6b26ec76bf8c1422608c9f1eb8

    • SSDEEP

      6144:yQeZ1Ul6Doyq8ioUZ1tJfVaDTAQ5YSv4l5tkRKMU+J3av1DGMi:yQeHGqWpLDGTAltbYO6

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.