General

  • Target

    168120473be2961a02ab3995ebc9e398_JaffaCakes118

  • Size

    100KB

  • Sample

    241005-g4d9nazfkj

  • MD5

    168120473be2961a02ab3995ebc9e398

  • SHA1

    77a6fe5fa76e34fafe9e84e6ba5eea40f157fe94

  • SHA256

    cd6a8ecb1f44b95461b89f9bd6c03747280cac657988798041a9673886d44f50

  • SHA512

    d2f84560b194f2dbd29e4cd3106728d4a6a5e8e33baa46707acebc9d8a72cf27a2bf20c8891a5a0ec932d44cf08f5da00660ae58f287b4e2c81732e1427c88ed

  • SSDEEP

    1536:6LvXlbHqb9SJGX5pXodrh6QHkPZ2donug7HwYN59vi6L1Trz6LSias1tiP:6LVeBAUohh6DPZ2oug7HwA/1Tr+WiaW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      168120473be2961a02ab3995ebc9e398_JaffaCakes118

    • Size

      100KB

    • MD5

      168120473be2961a02ab3995ebc9e398

    • SHA1

      77a6fe5fa76e34fafe9e84e6ba5eea40f157fe94

    • SHA256

      cd6a8ecb1f44b95461b89f9bd6c03747280cac657988798041a9673886d44f50

    • SHA512

      d2f84560b194f2dbd29e4cd3106728d4a6a5e8e33baa46707acebc9d8a72cf27a2bf20c8891a5a0ec932d44cf08f5da00660ae58f287b4e2c81732e1427c88ed

    • SSDEEP

      1536:6LvXlbHqb9SJGX5pXodrh6QHkPZ2donug7HwYN59vi6L1Trz6LSias1tiP:6LVeBAUohh6DPZ2oug7HwA/1Tr+WiaW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks