General

  • Target

    a5ab17fd7cf44fbd5dd9cb5a1ce2e3b1_JaffaCakes118

  • Size

    194KB

  • Sample

    240818-gtd6xascrm

  • MD5

    a5ab17fd7cf44fbd5dd9cb5a1ce2e3b1

  • SHA1

    88f97e3b857ce33418fce620bbf2a1e5a1183a07

  • SHA256

    9a9a8a09d71c27b73c4a2096a65965bdcf0eeaec7c7279abad8895d01324b20d

  • SHA512

    c6d41dc576f0df14dc6d0da3234d0bc442ad446d279563232c20298aaf071b02853b569d036a71bb952ddc3fbc6ccfd5a48bd1ad1cfb2a2e72651a09cb285fcf

  • SSDEEP

    6144:3H3geqbjYWqsEKPVHKe934TQHvk2bLjEGF:3HQBjYWqsEKdHKy39Pk2ge

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      a5ab17fd7cf44fbd5dd9cb5a1ce2e3b1_JaffaCakes118

    • Size

      194KB

    • MD5

      a5ab17fd7cf44fbd5dd9cb5a1ce2e3b1

    • SHA1

      88f97e3b857ce33418fce620bbf2a1e5a1183a07

    • SHA256

      9a9a8a09d71c27b73c4a2096a65965bdcf0eeaec7c7279abad8895d01324b20d

    • SHA512

      c6d41dc576f0df14dc6d0da3234d0bc442ad446d279563232c20298aaf071b02853b569d036a71bb952ddc3fbc6ccfd5a48bd1ad1cfb2a2e72651a09cb285fcf

    • SSDEEP

      6144:3H3geqbjYWqsEKPVHKe934TQHvk2bLjEGF:3HQBjYWqsEKdHKy39Pk2ge

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks