General

  • Target

    96252915440e7396063d6583abcf14b6_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240814-pw3w2sxdpp

  • MD5

    96252915440e7396063d6583abcf14b6

  • SHA1

    6b9a3dc219f26d2ff5510febaa8a59481066d73d

  • SHA256

    3ad67d62e14e05cb54d5f91edb35c16f8338fe3a7b8f5e6f72eb3c7de316e33b

  • SHA512

    48974c744097ee840c70cbb14e1c1e256a06ad7ce09668850de8ef8812f51f587bd3eff3c86ea95ee914ff00f163374fab2829aea2c8ed1162dd9ed59a89f01a

  • SSDEEP

    24576:vqWRiapiib65ngFBFOG2boPev5+RCq9Ym:vn4W65gFBcGpaW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      96252915440e7396063d6583abcf14b6_JaffaCakes118

    • Size

      1.1MB

    • MD5

      96252915440e7396063d6583abcf14b6

    • SHA1

      6b9a3dc219f26d2ff5510febaa8a59481066d73d

    • SHA256

      3ad67d62e14e05cb54d5f91edb35c16f8338fe3a7b8f5e6f72eb3c7de316e33b

    • SHA512

      48974c744097ee840c70cbb14e1c1e256a06ad7ce09668850de8ef8812f51f587bd3eff3c86ea95ee914ff00f163374fab2829aea2c8ed1162dd9ed59a89f01a

    • SSDEEP

      24576:vqWRiapiib65ngFBFOG2boPev5+RCq9Ym:vn4W65gFBcGpaW

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks