General

  • Target

    f034e64039d2d72d14f94c7d6826d493_JaffaCakes118

  • Size

    123KB

  • Sample

    240921-t5balssfjp

  • MD5

    f034e64039d2d72d14f94c7d6826d493

  • SHA1

    4465413ed4a98564c625ff944264e553e16f5413

  • SHA256

    1935e4bb698dbedbc123eb3c7e0465ee74dbc77cf99e526c5a91babb23cda9bb

  • SHA512

    69aa88514d3d59a65e804a4cfd55b45ef045b7a3120c8ddb5cf16c7ea08a6621f371b4e6b50015ddab75b792670312d0354184c0bc7dfd78dca758854736506c

  • SSDEEP

    3072:bkdjlbfpbo19yTxhaDxc8fDxqF9sqBQMb1XHEX+mwzjAE7:bKS9yTxmZtqF9svWHfzzjAE7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f034e64039d2d72d14f94c7d6826d493_JaffaCakes118

    • Size

      123KB

    • MD5

      f034e64039d2d72d14f94c7d6826d493

    • SHA1

      4465413ed4a98564c625ff944264e553e16f5413

    • SHA256

      1935e4bb698dbedbc123eb3c7e0465ee74dbc77cf99e526c5a91babb23cda9bb

    • SHA512

      69aa88514d3d59a65e804a4cfd55b45ef045b7a3120c8ddb5cf16c7ea08a6621f371b4e6b50015ddab75b792670312d0354184c0bc7dfd78dca758854736506c

    • SSDEEP

      3072:bkdjlbfpbo19yTxhaDxc8fDxqF9sqBQMb1XHEX+mwzjAE7:bKS9yTxmZtqF9svWHfzzjAE7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks