General

  • Target

    5b460c0abfa9eef48f6c17c01bdb1e60_JaffaCakes118

  • Size

    1022KB

  • Sample

    240719-k1c4zasgpp

  • MD5

    5b460c0abfa9eef48f6c17c01bdb1e60

  • SHA1

    324ae088e471e14fe50604a4a66e88b53f1cf4e5

  • SHA256

    59771e45f8f1621170964837b478392ff3a8f6ae28095541f7538f92a78c0e6d

  • SHA512

    b3f762c7f73c65d5524b645c6065043c6620b7826757b763046d7321db8001b69542ffe56cf6a0d426fdeeca1f67cb8aaf3fc99668ed34e026a6a1894e81f681

  • SSDEEP

    12288:RbYihYiumQsxtNWU32q14QAIoJ6Ih8T2mClbw8Grq/KT05Q5o8w5Cv9ekjtc:l8bIj1j6f0E86mClbwrqCT05o59Dc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      5b460c0abfa9eef48f6c17c01bdb1e60_JaffaCakes118

    • Size

      1022KB

    • MD5

      5b460c0abfa9eef48f6c17c01bdb1e60

    • SHA1

      324ae088e471e14fe50604a4a66e88b53f1cf4e5

    • SHA256

      59771e45f8f1621170964837b478392ff3a8f6ae28095541f7538f92a78c0e6d

    • SHA512

      b3f762c7f73c65d5524b645c6065043c6620b7826757b763046d7321db8001b69542ffe56cf6a0d426fdeeca1f67cb8aaf3fc99668ed34e026a6a1894e81f681

    • SSDEEP

      12288:RbYihYiumQsxtNWU32q14QAIoJ6Ih8T2mClbw8Grq/KT05Q5o8w5Cv9ekjtc:l8bIj1j6f0E86mClbwrqCT05o59Dc

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks