General

  • Target

    43da5ffbac65c6f767ae2dbacaff7158_JaffaCakes118

  • Size

    100KB

  • Sample

    241014-ybpy5asepb

  • MD5

    43da5ffbac65c6f767ae2dbacaff7158

  • SHA1

    32b6a91aded8747a0333dc6591f971c562511171

  • SHA256

    dd64040abca9cbf6e4c3987d067ba1167e995b83e21151e2ed1c5ba0af1c04d9

  • SHA512

    369ac0dadaa0c3bb3fe5916a0243647aafcf39ad872a0725aabc6b3176f9cd021e386a99e21568c7185376514075f35af288aa963e8c1a66fbf56225cc81470a

  • SSDEEP

    1536:qKTZeR4k3P+Db3lSQgIveYyp70amakGlT1JnbJLOC37raGsn:qKYRV32DbQQgIy90zatv1KcaGs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      43da5ffbac65c6f767ae2dbacaff7158_JaffaCakes118

    • Size

      100KB

    • MD5

      43da5ffbac65c6f767ae2dbacaff7158

    • SHA1

      32b6a91aded8747a0333dc6591f971c562511171

    • SHA256

      dd64040abca9cbf6e4c3987d067ba1167e995b83e21151e2ed1c5ba0af1c04d9

    • SHA512

      369ac0dadaa0c3bb3fe5916a0243647aafcf39ad872a0725aabc6b3176f9cd021e386a99e21568c7185376514075f35af288aa963e8c1a66fbf56225cc81470a

    • SSDEEP

      1536:qKTZeR4k3P+Db3lSQgIveYyp70amakGlT1JnbJLOC37raGsn:qKYRV32DbQQgIy90zatv1KcaGs

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks