General

  • Target

    0f9558ece6a03c5cd67a3d70e10829a8_JaffaCakes118

  • Size

    100KB

  • Sample

    241003-ttdxcsyamh

  • MD5

    0f9558ece6a03c5cd67a3d70e10829a8

  • SHA1

    2e57558c3fa32f67534ef3b534bcb397a78f2e09

  • SHA256

    ac3c24a616b1ddd4d5c738c18e27d90204d9b3307f79377bc0d8e3d2e70c26f7

  • SHA512

    f45cd78428cf00f584778acfe2e5e25c4bec9fcb0ab5d692fd8fdbf3afe0708283c1eed6f0435cc0c6fdbd1840c3e5dfda416a1ebede5d1049538de8aa106ee7

  • SSDEEP

    3072:vt3e5SOZUZmFeaS0AmCpB6yhtKTCs2l7Kg1:vZeQuUZfD0OJbs2Vn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      0f9558ece6a03c5cd67a3d70e10829a8_JaffaCakes118

    • Size

      100KB

    • MD5

      0f9558ece6a03c5cd67a3d70e10829a8

    • SHA1

      2e57558c3fa32f67534ef3b534bcb397a78f2e09

    • SHA256

      ac3c24a616b1ddd4d5c738c18e27d90204d9b3307f79377bc0d8e3d2e70c26f7

    • SHA512

      f45cd78428cf00f584778acfe2e5e25c4bec9fcb0ab5d692fd8fdbf3afe0708283c1eed6f0435cc0c6fdbd1840c3e5dfda416a1ebede5d1049538de8aa106ee7

    • SSDEEP

      3072:vt3e5SOZUZmFeaS0AmCpB6yhtKTCs2l7Kg1:vZeQuUZfD0OJbs2Vn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks