General

  • Target

    67768ecf5e07e63a02dea55527866c58_JaffaCakes118

  • Size

    167KB

  • Sample

    240723-nxjzwsvdql

  • MD5

    67768ecf5e07e63a02dea55527866c58

  • SHA1

    afc166831d6c055f454681f2cee60ce7d6403b98

  • SHA256

    8c0092e09172f838b47e86868f196f7a12b69237f6843459daf58e87b88292c4

  • SHA512

    5b9d53dc4b149bcd2838abe274c98ea0f99b1f9abbca18bb6feca94f8123647bf2ba9abe7a1116a2c155956387061d1b18bb10ad14b97d78a2d0c50866729a5c

  • SSDEEP

    3072:sNQKPWDynI0fFJltZrpReFX3XGc7nHzPHMWo1MAkISL:sNSDynIkFthpJaT/MWk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      67768ecf5e07e63a02dea55527866c58_JaffaCakes118

    • Size

      167KB

    • MD5

      67768ecf5e07e63a02dea55527866c58

    • SHA1

      afc166831d6c055f454681f2cee60ce7d6403b98

    • SHA256

      8c0092e09172f838b47e86868f196f7a12b69237f6843459daf58e87b88292c4

    • SHA512

      5b9d53dc4b149bcd2838abe274c98ea0f99b1f9abbca18bb6feca94f8123647bf2ba9abe7a1116a2c155956387061d1b18bb10ad14b97d78a2d0c50866729a5c

    • SSDEEP

      3072:sNQKPWDynI0fFJltZrpReFX3XGc7nHzPHMWo1MAkISL:sNSDynIkFthpJaT/MWk

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks