General

  • Target

    12b973910f826f2c9395b3f02d0ced57_JaffaCakes118

  • Size

    377KB

  • Sample

    240626-vhjtxatdpe

  • MD5

    12b973910f826f2c9395b3f02d0ced57

  • SHA1

    48d30ab1d55ddefc3eb7b68228d477a1c3c7adc1

  • SHA256

    579fb0c8f1ba67c8779150aab4872b78a88671090c140efa564b9ba7ea2981b4

  • SHA512

    1cf046c767bd2516364fda4c2fed954365937b3bede85e3601bdf4024b93e3a1224635794f5e3ceaf7404253c8868e8f7f83b029bfafd1dd98178a0df21bf19f

  • SSDEEP

    6144:q28mToPWbkufN2CAxwYzmP18thzKhv7kJcERQDj+mzxWRKQmN3e/q:xToeeRwimP1YiScEU+mzxWrmN3/

Malware Config

Extracted

Family

cybergate

Version

v1.07.5

Botnet

Cyber

C2

paketeditorupdate.no-ip.biz:15401

Mutex

703643K65B13X4

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    PaketEditor

  • install_file

    update

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Persits.MailSender.4 (0x800A0002) Winsock error 11004 (0x2AFC) occurred.

  • message_box_title

    Winsock error 11004 (0x2AFC) occurred

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      12b973910f826f2c9395b3f02d0ced57_JaffaCakes118

    • Size

      377KB

    • MD5

      12b973910f826f2c9395b3f02d0ced57

    • SHA1

      48d30ab1d55ddefc3eb7b68228d477a1c3c7adc1

    • SHA256

      579fb0c8f1ba67c8779150aab4872b78a88671090c140efa564b9ba7ea2981b4

    • SHA512

      1cf046c767bd2516364fda4c2fed954365937b3bede85e3601bdf4024b93e3a1224635794f5e3ceaf7404253c8868e8f7f83b029bfafd1dd98178a0df21bf19f

    • SSDEEP

      6144:q28mToPWbkufN2CAxwYzmP18thzKhv7kJcERQDj+mzxWRKQmN3e/q:xToeeRwimP1YiScEU+mzxWrmN3/

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Tasks