General

  • Target

    ea82d4ee85ab477b2b22de3446e07d02_JaffaCakes118

  • Size

    73KB

  • Sample

    240919-d5slwsyhjr

  • MD5

    ea82d4ee85ab477b2b22de3446e07d02

  • SHA1

    e659150117eda6b8505e0dce917522fdc6fbc7f7

  • SHA256

    5af7b711ca749efbce220c0cb046d40f8d7b56cedc2e1d044aede43f72eab1cf

  • SHA512

    cdb16afe529474505888e1465d07e505db3756e01bd9ca8636361c60ac4c557f7b2c52cab93d30fc7b6b15ef9861bcbf346f4d7e55b15d5eec5192faeaf1806e

  • SSDEEP

    1536:eC830pGwWGqyB5lCmCseN8PYVo7aK7kjfcwsb5PQYnS5/o5Pevy5lN8BZP57:OAGwZ5lChszw+uKkjcwkhQwSVo5K4Ox7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      ea82d4ee85ab477b2b22de3446e07d02_JaffaCakes118

    • Size

      73KB

    • MD5

      ea82d4ee85ab477b2b22de3446e07d02

    • SHA1

      e659150117eda6b8505e0dce917522fdc6fbc7f7

    • SHA256

      5af7b711ca749efbce220c0cb046d40f8d7b56cedc2e1d044aede43f72eab1cf

    • SHA512

      cdb16afe529474505888e1465d07e505db3756e01bd9ca8636361c60ac4c557f7b2c52cab93d30fc7b6b15ef9861bcbf346f4d7e55b15d5eec5192faeaf1806e

    • SSDEEP

      1536:eC830pGwWGqyB5lCmCseN8PYVo7aK7kjfcwsb5PQYnS5/o5Pevy5lN8BZP57:OAGwZ5lChszw+uKkjcwkhQwSVo5K4Ox7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks