General

  • Target

    78e8256b3e62dc92b3017d829f29fa2e_JaffaCakes118

  • Size

    100KB

  • Sample

    240727-vpztpszbll

  • MD5

    78e8256b3e62dc92b3017d829f29fa2e

  • SHA1

    5a78d303436aaee4fe61b2d97a5f1f8fff3d8617

  • SHA256

    6510105a83a5c50fcb6f7e30ac2525ea4fabd81f581fa4ad5f29ef366cda5f9d

  • SHA512

    1a7df20f44708e0ed9a64a212e1185cec0b9ccdd96d836ec5d1af70f5b5bdab22663bb2a6f3edc7b85195a5d8d39831c45f54e66ce8ce1a1e5ad388e2671de9a

  • SSDEEP

    1536:ikcKKFPXvFflcp+yJ6s9YAgKcib9q9qfQlDgJUnBNqlvrN+G9X6ta1G7QTgfNT:T0XFOXJB9YAgK7mqfQgLBrN/CmtTkNT

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      78e8256b3e62dc92b3017d829f29fa2e_JaffaCakes118

    • Size

      100KB

    • MD5

      78e8256b3e62dc92b3017d829f29fa2e

    • SHA1

      5a78d303436aaee4fe61b2d97a5f1f8fff3d8617

    • SHA256

      6510105a83a5c50fcb6f7e30ac2525ea4fabd81f581fa4ad5f29ef366cda5f9d

    • SHA512

      1a7df20f44708e0ed9a64a212e1185cec0b9ccdd96d836ec5d1af70f5b5bdab22663bb2a6f3edc7b85195a5d8d39831c45f54e66ce8ce1a1e5ad388e2671de9a

    • SSDEEP

      1536:ikcKKFPXvFflcp+yJ6s9YAgKcib9q9qfQlDgJUnBNqlvrN+G9X6ta1G7QTgfNT:T0XFOXJB9YAgK7mqfQgLBrN/CmtTkNT

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks