General

  • Target

    JaffaCakes118_ad24ade14c7a169d7b687acaf5d483ef

  • Size

    487KB

  • Sample

    250411-grslhs1vew

  • MD5

    ad24ade14c7a169d7b687acaf5d483ef

  • SHA1

    9ac9d5ddd2e8ad884bff69c158e8fe8e3a6c0c36

  • SHA256

    cc13c9352cde1f7ec1a25a16cb708646eae84ef1e5fbddfbac77217e2cc1d8b2

  • SHA512

    ac02bc61843772ce52d652d07756a860d4fd09cd5b8e50c2a11918254bd95b7e6ae050eb3f93fa87f1d4e61c0d487557bbe504a7d1e4d0607f25a713691b54b7

  • SSDEEP

    6144:FtEl0756tRi4eDAFmT96K8eAPxyfh4jzl3wP4cgM407llaaXiARuztJimzh5uo:H57MuvAenApjGw7fwrXdiJim6o

Malware Config

Extracted

Family

cybergate

Version

v1.02.0

Botnet

remote

C2

127.0.0.1:81

Mutex

2F0HUNC68U3234

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    ded.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    1234567

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      JaffaCakes118_ad24ade14c7a169d7b687acaf5d483ef

    • Size

      487KB

    • MD5

      ad24ade14c7a169d7b687acaf5d483ef

    • SHA1

      9ac9d5ddd2e8ad884bff69c158e8fe8e3a6c0c36

    • SHA256

      cc13c9352cde1f7ec1a25a16cb708646eae84ef1e5fbddfbac77217e2cc1d8b2

    • SHA512

      ac02bc61843772ce52d652d07756a860d4fd09cd5b8e50c2a11918254bd95b7e6ae050eb3f93fa87f1d4e61c0d487557bbe504a7d1e4d0607f25a713691b54b7

    • SSDEEP

      6144:FtEl0756tRi4eDAFmT96K8eAPxyfh4jzl3wP4cgM407llaaXiARuztJimzh5uo:H57MuvAenApjGw7fwrXdiJim6o

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.