General

  • Target

    18c62d134b35866d4084e4a8c171ed77_JaffaCakes118

  • Size

    649KB

  • Sample

    240628-e3s1batfll

  • MD5

    18c62d134b35866d4084e4a8c171ed77

  • SHA1

    0146afdcc6ba20cd4fa9fa6fb9fee206e6dd7ac8

  • SHA256

    d5e6a4d6ce51cb9428261a8d24ab2ffe5ba46da31bd6ab5a98d0ee69d3a5ea8e

  • SHA512

    f6a535eb7fea4b7a025ea14d7636a0fff641c869ba9d039b6baef264cce0745f5c77ba484430c054fa36bbcd9fc73d243b372c72226987ea2f17d64766461362

  • SSDEEP

    12288:icD663RQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQRt:iwLtwCc26uGi2VCHXSBzTaDMsAQRt

Malware Config

Extracted

Family

cybergate

Version

2.7 Final

Botnet

SinGa

C2

kimissard.no-ip.org:6919

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    iexplore.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Mot de passe : G456FG1E6G4RE8

  • message_box_title

    Msn

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Targets

    • Target

      18c62d134b35866d4084e4a8c171ed77_JaffaCakes118

    • Size

      649KB

    • MD5

      18c62d134b35866d4084e4a8c171ed77

    • SHA1

      0146afdcc6ba20cd4fa9fa6fb9fee206e6dd7ac8

    • SHA256

      d5e6a4d6ce51cb9428261a8d24ab2ffe5ba46da31bd6ab5a98d0ee69d3a5ea8e

    • SHA512

      f6a535eb7fea4b7a025ea14d7636a0fff641c869ba9d039b6baef264cce0745f5c77ba484430c054fa36bbcd9fc73d243b372c72226987ea2f17d64766461362

    • SSDEEP

      12288:icD663RQ4dLOSwCDfJqlE6uGiGSAlVLuBRzXA2oAMHVB66EYAUTS9D/ksSzQRt:iwLtwCc26uGi2VCHXSBzTaDMsAQRt

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks