General

  • Target

    934b9bf7a3a513cb330656bdceb09359_JaffaCakes118

  • Size

    130KB

  • Sample

    241124-jbf9nazncz

  • MD5

    934b9bf7a3a513cb330656bdceb09359

  • SHA1

    1c463f65cd451e6291bedfc38bd06ca172fc6cba

  • SHA256

    ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2

  • SHA512

    a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc

  • SSDEEP

    3072:m1QMh8DB5J9Sb4g7uigN2KCotYCg4TILnW5NTG8x:rG8bJ9Sb4gM2nCg4kinx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

xtremerat

C2

mastino.no-ip.org

Targets

    • Target

      934b9bf7a3a513cb330656bdceb09359_JaffaCakes118

    • Size

      130KB

    • MD5

      934b9bf7a3a513cb330656bdceb09359

    • SHA1

      1c463f65cd451e6291bedfc38bd06ca172fc6cba

    • SHA256

      ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2

    • SHA512

      a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc

    • SSDEEP

      3072:m1QMh8DB5J9Sb4g7uigN2KCotYCg4TILnW5NTG8x:rG8bJ9Sb4gM2nCg4kinx

    • Detect XtremeRAT payload

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks