General

  • Target

    08f55187112e030299031aa2add20fad_JaffaCakes118

  • Size

    100KB

  • Sample

    241002-fejx6s1gqb

  • MD5

    08f55187112e030299031aa2add20fad

  • SHA1

    081acd6d8f6221b8df206faff770ce4267b2446d

  • SHA256

    2d00b81a0f383965e3ec4d04184abd0eb40dce1563904c721f293f955655b432

  • SHA512

    a4a819650661e801746e4b915b8df974e4a4cc4aabb4c8e6d403124af3eefa04b56ec1d2d3f9b94c43db89b1e5b1c648c9b1bbe2eaf03292b5ab4425142103b4

  • SSDEEP

    1536:IYlDv11P1huiMVD4OqKgXQpasSlSxG0CICkyOY764qhMeAz2V9a:Ia/1huHVEOTpmlSxG0xyOYu4qhMd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      08f55187112e030299031aa2add20fad_JaffaCakes118

    • Size

      100KB

    • MD5

      08f55187112e030299031aa2add20fad

    • SHA1

      081acd6d8f6221b8df206faff770ce4267b2446d

    • SHA256

      2d00b81a0f383965e3ec4d04184abd0eb40dce1563904c721f293f955655b432

    • SHA512

      a4a819650661e801746e4b915b8df974e4a4cc4aabb4c8e6d403124af3eefa04b56ec1d2d3f9b94c43db89b1e5b1c648c9b1bbe2eaf03292b5ab4425142103b4

    • SSDEEP

      1536:IYlDv11P1huiMVD4OqKgXQpasSlSxG0CICkyOY764qhMeAz2V9a:Ia/1huHVEOTpmlSxG0xyOYu4qhMd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks