General

  • Target

    36748ff62c29aadb4902cd4d153ff936_JaffaCakes118

  • Size

    480KB

  • Sample

    240710-1bhadstble

  • MD5

    36748ff62c29aadb4902cd4d153ff936

  • SHA1

    62688783f995095641e73be9ec98a5eb58125a9a

  • SHA256

    1cf25ba2493c489c31b4033e97e63f9b763b1498bc35120920a0311e06dccd55

  • SHA512

    97a8b8b1738cb83ea5f14a64398788b184e8aa718383db6948c4681ed815d5cb489cea6c90ed6b7393e5b26829c22aa9bb7d872724403e51ff99cc97aebe1787

  • SSDEEP

    6144:FTcW1VYD3a/guRyxxgKK/qF3AAiezqDBGv6TWIyQZGVTw1L5trBuLs0MYgMeJM:ZVYTa/gxxgK3QLDBlgwx/BuI0gMeJM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      36748ff62c29aadb4902cd4d153ff936_JaffaCakes118

    • Size

      480KB

    • MD5

      36748ff62c29aadb4902cd4d153ff936

    • SHA1

      62688783f995095641e73be9ec98a5eb58125a9a

    • SHA256

      1cf25ba2493c489c31b4033e97e63f9b763b1498bc35120920a0311e06dccd55

    • SHA512

      97a8b8b1738cb83ea5f14a64398788b184e8aa718383db6948c4681ed815d5cb489cea6c90ed6b7393e5b26829c22aa9bb7d872724403e51ff99cc97aebe1787

    • SSDEEP

      6144:FTcW1VYD3a/guRyxxgKK/qF3AAiezqDBGv6TWIyQZGVTw1L5trBuLs0MYgMeJM:ZVYTa/gxxgK3QLDBlgwx/BuI0gMeJM

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks