General

  • Target

    4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118

  • Size

    2.4MB

  • Sample

    240716-lpgtfswdpl

  • MD5

    4dc3056d771e553df08b4f1fd1ec1c9c

  • SHA1

    eb8c8106f5f86b0b28b803e73d2558c59072de8c

  • SHA256

    9d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c

  • SHA512

    aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0

  • SSDEEP

    49152:M0r+eSD+HTaRbHRAaLlzRIBrLbakBen7z4JA3iOCjLyGD0H/Mw:M0ZSDcOhNpqBrncou3i1m7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118

    • Size

      2.4MB

    • MD5

      4dc3056d771e553df08b4f1fd1ec1c9c

    • SHA1

      eb8c8106f5f86b0b28b803e73d2558c59072de8c

    • SHA256

      9d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c

    • SHA512

      aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0

    • SSDEEP

      49152:M0r+eSD+HTaRbHRAaLlzRIBrLbakBen7z4JA3iOCjLyGD0H/Mw:M0ZSDcOhNpqBrncou3i1m7

    • Detects Strela Stealer payload

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks