General

  • Target

    cdbe6b3ae620139c0dcaf9fc7e8c8022_JaffaCakes118

  • Size

    106KB

  • Sample

    241206-sygy5sznfj

  • MD5

    cdbe6b3ae620139c0dcaf9fc7e8c8022

  • SHA1

    c22b64ee005ebde51ae4ae636a015998e440ca70

  • SHA256

    7237c1c80059b9337b15d776f78d05e7faac7bd965ee7252135ce7500b85da7f

  • SHA512

    2d8611c3fa2f714ce19581a802d79e6a9baa734e7cbb95552f2853ad109603622db75a1bd4ad61b3b39d0c58efd1f375a78dc98a0ae83fc31530db068855c252

  • SSDEEP

    3072:bceyfEcMW0OTpG5PbN8QY1HDg0hH6HjYq2EiR52:bceikxOTIbNm1HMM6MqviR52

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cdbe6b3ae620139c0dcaf9fc7e8c8022_JaffaCakes118

    • Size

      106KB

    • MD5

      cdbe6b3ae620139c0dcaf9fc7e8c8022

    • SHA1

      c22b64ee005ebde51ae4ae636a015998e440ca70

    • SHA256

      7237c1c80059b9337b15d776f78d05e7faac7bd965ee7252135ce7500b85da7f

    • SHA512

      2d8611c3fa2f714ce19581a802d79e6a9baa734e7cbb95552f2853ad109603622db75a1bd4ad61b3b39d0c58efd1f375a78dc98a0ae83fc31530db068855c252

    • SSDEEP

      3072:bceyfEcMW0OTpG5PbN8QY1HDg0hH6HjYq2EiR52:bceikxOTIbNm1HMM6MqviR52

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks