General

  • Target

    c7e56f2100de913d821bee705aedb9b1_JaffaCakes118

  • Size

    100KB

  • Sample

    241205-ql5hkasler

  • MD5

    c7e56f2100de913d821bee705aedb9b1

  • SHA1

    a1ac1f27a97ebdf4b7efa6f575fca2f9e8498d8f

  • SHA256

    914d74d2944f5d6606714142bc2060a3ef2d10e46d6f38a94faf8b24683fb54f

  • SHA512

    dfd7a593dd77136808415277c4f5649873eee9408961d6e506b3b3293313bed3dc66d988369ab9008588696a4bc728467c845433011a6f1cf1fafa41e1396cc3

  • SSDEEP

    1536:VsdXc5p8kGC1aelBZ0GIH6ncdbTEFHN266VCfitgAzixwB8B+fGDoRh:VqEpOC9iHGUbQhN266VK8zsE8UfHh

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      c7e56f2100de913d821bee705aedb9b1_JaffaCakes118

    • Size

      100KB

    • MD5

      c7e56f2100de913d821bee705aedb9b1

    • SHA1

      a1ac1f27a97ebdf4b7efa6f575fca2f9e8498d8f

    • SHA256

      914d74d2944f5d6606714142bc2060a3ef2d10e46d6f38a94faf8b24683fb54f

    • SHA512

      dfd7a593dd77136808415277c4f5649873eee9408961d6e506b3b3293313bed3dc66d988369ab9008588696a4bc728467c845433011a6f1cf1fafa41e1396cc3

    • SSDEEP

      1536:VsdXc5p8kGC1aelBZ0GIH6ncdbTEFHN266VCfitgAzixwB8B+fGDoRh:VqEpOC9iHGUbQhN266VK8zsE8UfHh

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks