General

  • Target

    69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118

  • Size

    447KB

  • Sample

    240724-cxt93swdre

  • MD5

    69eb2997d3bfe12e95f034621e4e280e

  • SHA1

    355dcfedf659a2aa4b3b101f2b0a1fbfbcda3ab1

  • SHA256

    94c657f4c9a052bc2eaa2a11a708115bf4ce425ed5857ea5febbf34539a13feb

  • SHA512

    3a7ec56cc1268bfa2f28625d43a9e6a21bac716a8e3aad54ddea4bbaa5ad6f9bd24d7dda826fc43c334d4696401fd86a7f608da1839cf14402105b0c86c16039

  • SSDEEP

    6144:PtMG0/QDWD3vpT/n3VLNhCyfkA1O4elpr/rere9cyzUykBx:6QSD5P3785AY4e7rKrFyQykBx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118

    • Size

      447KB

    • MD5

      69eb2997d3bfe12e95f034621e4e280e

    • SHA1

      355dcfedf659a2aa4b3b101f2b0a1fbfbcda3ab1

    • SHA256

      94c657f4c9a052bc2eaa2a11a708115bf4ce425ed5857ea5febbf34539a13feb

    • SHA512

      3a7ec56cc1268bfa2f28625d43a9e6a21bac716a8e3aad54ddea4bbaa5ad6f9bd24d7dda826fc43c334d4696401fd86a7f608da1839cf14402105b0c86c16039

    • SSDEEP

      6144:PtMG0/QDWD3vpT/n3VLNhCyfkA1O4elpr/rere9cyzUykBx:6QSD5P3785AY4e7rKrFyQykBx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks