General

  • Target

    0e53af0d0fd45bb3d9176d4a2ef71773_JaffaCakes118

  • Size

    120KB

  • Sample

    240625-q85rvawhrq

  • MD5

    0e53af0d0fd45bb3d9176d4a2ef71773

  • SHA1

    287c09d13bf135f178f9c5d600115cf04a153fe7

  • SHA256

    380c005f7a90d1a74c9eb05a7b9d79bad4a5aef7152b9e0bc22bcb6d6638ecf2

  • SHA512

    c6e2e9bb0ed92ea9b36d0ee146f5ffeee2de9535dfa6bdddd68f3685d489e35a7006fc8fc7b101c827beb888e456a94a409dd1f66dcf17b00443894e45ad9ed5

  • SSDEEP

    3072:Up4Wfz/T4eijtDrpRbk5tdbmYHmydJSRcWoBZ:ofz/pijltStdbm87Z

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      0e53af0d0fd45bb3d9176d4a2ef71773_JaffaCakes118

    • Size

      120KB

    • MD5

      0e53af0d0fd45bb3d9176d4a2ef71773

    • SHA1

      287c09d13bf135f178f9c5d600115cf04a153fe7

    • SHA256

      380c005f7a90d1a74c9eb05a7b9d79bad4a5aef7152b9e0bc22bcb6d6638ecf2

    • SHA512

      c6e2e9bb0ed92ea9b36d0ee146f5ffeee2de9535dfa6bdddd68f3685d489e35a7006fc8fc7b101c827beb888e456a94a409dd1f66dcf17b00443894e45ad9ed5

    • SSDEEP

      3072:Up4Wfz/T4eijtDrpRbk5tdbmYHmydJSRcWoBZ:ofz/pijltStdbm87Z

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks