General

  • Target

    c6acc349e99164db0cabbee0a3aba612_JaffaCakes118

  • Size

    120KB

  • Sample

    241205-jqd3vavpds

  • MD5

    c6acc349e99164db0cabbee0a3aba612

  • SHA1

    61106a860261001f20c98e4cb1b570387fdc2558

  • SHA256

    c337f881f606f8be73242bb782b27b5760cd2e5527a3e2fd88b53ed6c6a8e3c3

  • SHA512

    fbdb060ad2f469e43fbc072894be78d1392db1f99de47b6074e3dc292990a066dda87ba03816248dd30f60edd00b26ad89e7ab3828c13e71eef54c296a2442cc

  • SSDEEP

    3072:RmUr2oD5ltK8ixq4AkfizQBirmokouRR3:YUrPK8ixq4kQQrWBR3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c6acc349e99164db0cabbee0a3aba612_JaffaCakes118

    • Size

      120KB

    • MD5

      c6acc349e99164db0cabbee0a3aba612

    • SHA1

      61106a860261001f20c98e4cb1b570387fdc2558

    • SHA256

      c337f881f606f8be73242bb782b27b5760cd2e5527a3e2fd88b53ed6c6a8e3c3

    • SHA512

      fbdb060ad2f469e43fbc072894be78d1392db1f99de47b6074e3dc292990a066dda87ba03816248dd30f60edd00b26ad89e7ab3828c13e71eef54c296a2442cc

    • SSDEEP

      3072:RmUr2oD5ltK8ixq4AkfizQBirmokouRR3:YUrPK8ixq4kQQrWBR3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks