General

  • Target

    eabc91bdd654bd24f623f5bec7c654ab_JaffaCakes118

  • Size

    100KB

  • Sample

    240919-gyapaavapd

  • MD5

    eabc91bdd654bd24f623f5bec7c654ab

  • SHA1

    f03292319093efe0ec4c2ac50f8707b422dff12f

  • SHA256

    01d16838b98e4bbbc0a446979f34ff1120092c4983547380e6f25923e2d69e80

  • SHA512

    47fc73f8a54c237a9fed5d194d1b64c76f303bb6f02dd73bae41aae8c7cb8b788e0265a9a73af3684ce1d941afe9cb6dd0ad16b1f1e1698226654f263590f9bf

  • SSDEEP

    1536:qvsck6w67Em55Vaxel+IrPIXGIxiukCPV3BfrtZH7qoZwZ8YiAZEKb:qUXqJpwS1A2Yi6PPzr/ZwZ8LiEKb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      eabc91bdd654bd24f623f5bec7c654ab_JaffaCakes118

    • Size

      100KB

    • MD5

      eabc91bdd654bd24f623f5bec7c654ab

    • SHA1

      f03292319093efe0ec4c2ac50f8707b422dff12f

    • SHA256

      01d16838b98e4bbbc0a446979f34ff1120092c4983547380e6f25923e2d69e80

    • SHA512

      47fc73f8a54c237a9fed5d194d1b64c76f303bb6f02dd73bae41aae8c7cb8b788e0265a9a73af3684ce1d941afe9cb6dd0ad16b1f1e1698226654f263590f9bf

    • SSDEEP

      1536:qvsck6w67Em55Vaxel+IrPIXGIxiukCPV3BfrtZH7qoZwZ8YiAZEKb:qUXqJpwS1A2Yi6PPzr/ZwZ8LiEKb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks