General

  • Target

    bec2b35e269ad5a22650d7902ebcb200_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240824-rhj8wsvhpq

  • MD5

    bec2b35e269ad5a22650d7902ebcb200

  • SHA1

    996b5ad64418d6cbe8a4257e1aeee4846e8a3ad6

  • SHA256

    ca41bc2179160d322b712a594c11805ba47290132c1737d3cdc90c0cd5fef262

  • SHA512

    92fd486d9a5f97a38dd3061ab5a3f9ebb5e348207647d64c95b71429ceb80b572f85fe4018f2dc4b5584db31d107adc6abaaf66c2f7167f57fdb41094b27e9a1

  • SSDEEP

    24576:qhvw+3jipvCAhGDiOg7jMsE78M5Sg+CXey8XLTIJw9RCtadNaiio:qhvt3jii956CO5XLTIw9yabaiio

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      bec2b35e269ad5a22650d7902ebcb200_JaffaCakes118

    • Size

      1.8MB

    • MD5

      bec2b35e269ad5a22650d7902ebcb200

    • SHA1

      996b5ad64418d6cbe8a4257e1aeee4846e8a3ad6

    • SHA256

      ca41bc2179160d322b712a594c11805ba47290132c1737d3cdc90c0cd5fef262

    • SHA512

      92fd486d9a5f97a38dd3061ab5a3f9ebb5e348207647d64c95b71429ceb80b572f85fe4018f2dc4b5584db31d107adc6abaaf66c2f7167f57fdb41094b27e9a1

    • SSDEEP

      24576:qhvw+3jipvCAhGDiOg7jMsE78M5Sg+CXey8XLTIJw9RCtadNaiio:qhvt3jii956CO5XLTIw9yabaiio

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks