General

  • Target

    377b971424f3a8f0b45e222ea075e0de_JaffaCakes118

  • Size

    167KB

  • Sample

    240711-dntgvsyarc

  • MD5

    377b971424f3a8f0b45e222ea075e0de

  • SHA1

    60b87ed2796b33255e8da9e0868879ebf8f87cef

  • SHA256

    59b22d5e2d71a3e371062f4eb3b871bc8232e4b71a70b6ec8d24106f3f9ac46f

  • SHA512

    d2d6e2bd7904a9ca98c9019996cb35d82ce1b7de6d97632137ad2862bdc1d2ae6b87750aa0f75327c72247af5f252f3a743ed36d7ef0f2ca52e1891d37ee2ff5

  • SSDEEP

    3072:ZNQKPWDyFI0fFJltZrpReFX3SSjZHjWWkMwRfqn7YU5y5/L:ZNSDyFIkFthp0ZHbkhQ7YU5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      377b971424f3a8f0b45e222ea075e0de_JaffaCakes118

    • Size

      167KB

    • MD5

      377b971424f3a8f0b45e222ea075e0de

    • SHA1

      60b87ed2796b33255e8da9e0868879ebf8f87cef

    • SHA256

      59b22d5e2d71a3e371062f4eb3b871bc8232e4b71a70b6ec8d24106f3f9ac46f

    • SHA512

      d2d6e2bd7904a9ca98c9019996cb35d82ce1b7de6d97632137ad2862bdc1d2ae6b87750aa0f75327c72247af5f252f3a743ed36d7ef0f2ca52e1891d37ee2ff5

    • SSDEEP

      3072:ZNQKPWDyFI0fFJltZrpReFX3SSjZHjWWkMwRfqn7YU5y5/L:ZNSDyFIkFthp0ZHbkhQ7YU5

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks