General

  • Target

    JaffaCakes118_b956b8e610886afd698fefbcbe05b5de

  • Size

    346KB

  • Sample

    250415-fc5rvsstgt

  • MD5

    b956b8e610886afd698fefbcbe05b5de

  • SHA1

    f24cb625d56704dce4df2fa254aa1b86c7bebc8f

  • SHA256

    ddc172043b336fa893e8823372df1b7f510651f83d1178628fa4dff352b90184

  • SHA512

    19b1b6a64e280e0eda90457c3e4ea3f955921cda96d91cb8cbdb10fdf963505ede66c8bb16230d418a03088183484cf002403e41b02e6bee4e7a97ea3024edd1

  • SSDEEP

    6144:JTHlh+Jgu4Rx8LMOpbRfQVPW5eWMM1m1Ycmfjs7mBzMgOsbKNZOR0Yv4b/TkOkgc:NySmfAKRvKNZk0YUHrs8I62L

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

new0525

C2

kkklll.zapto.org:25437

Mutex

KLN62F7SEO0R3D

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    conmon files

  • install_file

    javr.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    123456

  • regkey_hkcu

    DindowsWefender

  • regkey_hklm

    DindowsWefender

Targets

    • Target

      JaffaCakes118_b956b8e610886afd698fefbcbe05b5de

    • Size

      346KB

    • MD5

      b956b8e610886afd698fefbcbe05b5de

    • SHA1

      f24cb625d56704dce4df2fa254aa1b86c7bebc8f

    • SHA256

      ddc172043b336fa893e8823372df1b7f510651f83d1178628fa4dff352b90184

    • SHA512

      19b1b6a64e280e0eda90457c3e4ea3f955921cda96d91cb8cbdb10fdf963505ede66c8bb16230d418a03088183484cf002403e41b02e6bee4e7a97ea3024edd1

    • SSDEEP

      6144:JTHlh+Jgu4Rx8LMOpbRfQVPW5eWMM1m1Ycmfjs7mBzMgOsbKNZOR0Yv4b/TkOkgc:NySmfAKRvKNZk0YUHrs8I62L

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Cybergate family

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks