General

  • Target

    77f8b578e9248ba04203d016dafbdffc_JaffaCakes118

  • Size

    100KB

  • Sample

    240727-m6r67awekr

  • MD5

    77f8b578e9248ba04203d016dafbdffc

  • SHA1

    ae27738a0c7e007d22e8ed72c32b6ef76d2c368b

  • SHA256

    f25e5642b6411d60771aac7d25c0883439bf550c2fbfb97447a1398b392285c5

  • SHA512

    189da812e3b9ff0ab00bd0105e0100b99f79e5ce79f2290409a48377cb1e4d86e7326a4686e8c39bfa401a234f2bf367d89f17d10d7047306c80ab719e901121

  • SSDEEP

    1536:nN3f/fzypCcPMI8prbbrK36C+0OxqeHLlA5AcrDc0Mv+pCEphEL9A:J/fR5Lrq/BVK2GcrDc0MGhELm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      77f8b578e9248ba04203d016dafbdffc_JaffaCakes118

    • Size

      100KB

    • MD5

      77f8b578e9248ba04203d016dafbdffc

    • SHA1

      ae27738a0c7e007d22e8ed72c32b6ef76d2c368b

    • SHA256

      f25e5642b6411d60771aac7d25c0883439bf550c2fbfb97447a1398b392285c5

    • SHA512

      189da812e3b9ff0ab00bd0105e0100b99f79e5ce79f2290409a48377cb1e4d86e7326a4686e8c39bfa401a234f2bf367d89f17d10d7047306c80ab719e901121

    • SSDEEP

      1536:nN3f/fzypCcPMI8prbbrK36C+0OxqeHLlA5AcrDc0Mv+pCEphEL9A:J/fR5Lrq/BVK2GcrDc0MGhELm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks