General

  • Target

    455f9e5b5b896f0880737ae9563f1a43_JaffaCakes118

  • Size

    452KB

  • Sample

    240714-l9ff5awejl

  • MD5

    455f9e5b5b896f0880737ae9563f1a43

  • SHA1

    8a43fd1687d4fbed0a143247e54103e6729dcd63

  • SHA256

    b3ee311dbd407fed66278ee22e705ce960946ead8beee2390440d1d19e24738e

  • SHA512

    f28d4137a6b7c5908eb50f3de3743b932054309a9a279798668cd789ed021389f9d561e3ba4cfa00712402897fc33df4234ed7c955f80aa60b65aa055900345f

  • SSDEEP

    6144:iGWK9s2n1sDEFSUknwoD6AaeICSj7kEoed0PFn0wccccccccAqX8FJLzslGg:i9ysVnKt7oUNhz9g

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      455f9e5b5b896f0880737ae9563f1a43_JaffaCakes118

    • Size

      452KB

    • MD5

      455f9e5b5b896f0880737ae9563f1a43

    • SHA1

      8a43fd1687d4fbed0a143247e54103e6729dcd63

    • SHA256

      b3ee311dbd407fed66278ee22e705ce960946ead8beee2390440d1d19e24738e

    • SHA512

      f28d4137a6b7c5908eb50f3de3743b932054309a9a279798668cd789ed021389f9d561e3ba4cfa00712402897fc33df4234ed7c955f80aa60b65aa055900345f

    • SSDEEP

      6144:iGWK9s2n1sDEFSUknwoD6AaeICSj7kEoed0PFn0wccccccccAqX8FJLzslGg:i9ysVnKt7oUNhz9g

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks