General

  • Target

    09fd50070c0063531af4ebf5d7fcc607_JaffaCakes118

  • Size

    100KB

  • Sample

    241002-leqnlssfnd

  • MD5

    09fd50070c0063531af4ebf5d7fcc607

  • SHA1

    0d3e3153f96598198773a86df76dc39fee27195a

  • SHA256

    b848273ad128bf9511b4fae1270a76fb0892c77a5e4feb1bd215ee3351caec77

  • SHA512

    f231b6dd477b957f87f1631bacfe813372c7a0a6572a89b471f4f5c66cae90e9fb962fb529d215d65aa0b8c24729e9c6ce42388d2552c798c796b0e97f14ce33

  • SSDEEP

    3072:llC017bzv2BBLbv60vn00rm07c0KR6Fy7H:L5dbzvGJ7bPBA0KR6FcH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      09fd50070c0063531af4ebf5d7fcc607_JaffaCakes118

    • Size

      100KB

    • MD5

      09fd50070c0063531af4ebf5d7fcc607

    • SHA1

      0d3e3153f96598198773a86df76dc39fee27195a

    • SHA256

      b848273ad128bf9511b4fae1270a76fb0892c77a5e4feb1bd215ee3351caec77

    • SHA512

      f231b6dd477b957f87f1631bacfe813372c7a0a6572a89b471f4f5c66cae90e9fb962fb529d215d65aa0b8c24729e9c6ce42388d2552c798c796b0e97f14ce33

    • SSDEEP

      3072:llC017bzv2BBLbv60vn00rm07c0KR6Fy7H:L5dbzvGJ7bPBA0KR6FcH

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks