General

  • Target

    1aa1245bfe8175b8667556660f02a572_JaffaCakes118

  • Size

    792KB

  • Sample

    240701-khzj9avflm

  • MD5

    1aa1245bfe8175b8667556660f02a572

  • SHA1

    921ca1a6f6a2b6cadacd56419ea9cde5624d445e

  • SHA256

    989b1a2a5eb22ab6f82df678ec93158d5d6f976288369be30c40bb549f83dac8

  • SHA512

    03ce27e83caa44d14734a9d1b197b02a2949c20eac3f8cc0e70a971c6fcfaca0b63f3ed0abf788e5e81e8c2b0872bb14be45949941c9d6b4c500c5effc5865c1

  • SSDEEP

    12288:6kU7S92gwbiYcaZOgCar7uPv1A3A43JKneF8WudXo7szkRtNP4Mm3hq4hegktShN:VkS0rikOgrxA43Jv8WsylfNPYhN

Malware Config

Extracted

Family

cybergate

Version

2.7 Beta 02

Botnet

BrEnKeR

C2

franders37.dyndns.info:63000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    false

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    WindowsUpdate

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    123456

  • regkey_hkcu

    HKCU

Targets

    • Target

      1aa1245bfe8175b8667556660f02a572_JaffaCakes118

    • Size

      792KB

    • MD5

      1aa1245bfe8175b8667556660f02a572

    • SHA1

      921ca1a6f6a2b6cadacd56419ea9cde5624d445e

    • SHA256

      989b1a2a5eb22ab6f82df678ec93158d5d6f976288369be30c40bb549f83dac8

    • SHA512

      03ce27e83caa44d14734a9d1b197b02a2949c20eac3f8cc0e70a971c6fcfaca0b63f3ed0abf788e5e81e8c2b0872bb14be45949941c9d6b4c500c5effc5865c1

    • SSDEEP

      12288:6kU7S92gwbiYcaZOgCar7uPv1A3A43JKneF8WudXo7szkRtNP4Mm3hq4hegktShN:VkS0rikOgrxA43Jv8WsylfNPYhN

    • CyberGate, Rebhip

      CyberGate is a lightweight remote administration tool with a wide array of functionalities.

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks