General

  • Target

    c0813f8bac42ad492937126340b96fe9_JaffaCakes118

  • Size

    100KB

  • Sample

    241204-dhv4hatpar

  • MD5

    c0813f8bac42ad492937126340b96fe9

  • SHA1

    562b25c9984ec936aeb1942e722654cd29700347

  • SHA256

    7530917b4f1ff57170c3be3465b5f1dfc1544b6b9839ab8b87439d76e89a97ea

  • SHA512

    3c88d9b7951b49bbfe2232e46ae24e371a08a1a4dfc7c7e0ae1c9c30622d5749f7543296be2461e0f5dec92ea4d4e4b357c4fadecee0f6d184ce42c563a1d9f2

  • SSDEEP

    3072:q3OtvwJdX6RlNF0GP2Rn0QNXOreDPeJy9:q3TBilMGOR9NaeSJk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      c0813f8bac42ad492937126340b96fe9_JaffaCakes118

    • Size

      100KB

    • MD5

      c0813f8bac42ad492937126340b96fe9

    • SHA1

      562b25c9984ec936aeb1942e722654cd29700347

    • SHA256

      7530917b4f1ff57170c3be3465b5f1dfc1544b6b9839ab8b87439d76e89a97ea

    • SHA512

      3c88d9b7951b49bbfe2232e46ae24e371a08a1a4dfc7c7e0ae1c9c30622d5749f7543296be2461e0f5dec92ea4d4e4b357c4fadecee0f6d184ce42c563a1d9f2

    • SSDEEP

      3072:q3OtvwJdX6RlNF0GP2Rn0QNXOreDPeJy9:q3TBilMGOR9NaeSJk

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks