General

  • Target

    ea13fab6196aa83a774f7a44bf81047a_JaffaCakes118

  • Size

    299KB

  • Sample

    240409-qlvclabc5v

  • MD5

    ea13fab6196aa83a774f7a44bf81047a

  • SHA1

    95bbd6f5529676266bafc07da898be6a03631d03

  • SHA256

    e6b60bf2899a3df4902d3ae28e367f38f1be7838132ee3580604ac4b040c7fe1

  • SHA512

    d4a92fd5283c6e91484210f9dfc49d32243150ee055697a4244db298f9ede65299c765f78266d5b77d5b2588f32c7fd7044fc56d9d03255dbfa46aedb5613ba2

  • SSDEEP

    6144:HKZwmWvP5tTV/x1SUg2AoRQVWm1UnT+4BwZz2CC3O3GQ:HKBWvbTRx/guxYXlM3JQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      ea13fab6196aa83a774f7a44bf81047a_JaffaCakes118

    • Size

      299KB

    • MD5

      ea13fab6196aa83a774f7a44bf81047a

    • SHA1

      95bbd6f5529676266bafc07da898be6a03631d03

    • SHA256

      e6b60bf2899a3df4902d3ae28e367f38f1be7838132ee3580604ac4b040c7fe1

    • SHA512

      d4a92fd5283c6e91484210f9dfc49d32243150ee055697a4244db298f9ede65299c765f78266d5b77d5b2588f32c7fd7044fc56d9d03255dbfa46aedb5613ba2

    • SSDEEP

      6144:HKZwmWvP5tTV/x1SUg2AoRQVWm1UnT+4BwZz2CC3O3GQ:HKBWvbTRx/guxYXlM3JQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks