General

  • Target

    14a308f15e0bb5983f9eff4f399fad1f_JaffaCakes118

  • Size

    950KB

  • Sample

    240627-es2jpsvarr

  • MD5

    14a308f15e0bb5983f9eff4f399fad1f

  • SHA1

    964aa9b7b414bf42460486f64f64055ac9dc10ce

  • SHA256

    b90a204b5761d2a9fc88b6a3e0c1b6c8f06c5de35b87219fd6454cf57e3a0b92

  • SHA512

    ccf64397722ecca9ea2d2f6fd44151c1949464451b132832e86fa88ebca64bb7ec0a4cbd3e41178760c1ea01fb29b65d4d42d8db6d70d8359ab4e09e5851df96

  • SSDEEP

    24576:hKxYTsPUynFtA6KHKuyRLhaQ7ZJ8v0NXTOJeEpp3ls26QTrwjc:hWznFWTuLl9pioXjc

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

vítima

C2

hgfl3322.no-ip.org:1615

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    1234

Targets

    • Target

      14a308f15e0bb5983f9eff4f399fad1f_JaffaCakes118

    • Size

      950KB

    • MD5

      14a308f15e0bb5983f9eff4f399fad1f

    • SHA1

      964aa9b7b414bf42460486f64f64055ac9dc10ce

    • SHA256

      b90a204b5761d2a9fc88b6a3e0c1b6c8f06c5de35b87219fd6454cf57e3a0b92

    • SHA512

      ccf64397722ecca9ea2d2f6fd44151c1949464451b132832e86fa88ebca64bb7ec0a4cbd3e41178760c1ea01fb29b65d4d42d8db6d70d8359ab4e09e5851df96

    • SSDEEP

      24576:hKxYTsPUynFtA6KHKuyRLhaQ7ZJ8v0NXTOJeEpp3ls26QTrwjc:hWznFWTuLl9pioXjc

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Tasks