General

  • Target

    d3e73ddaa1693378b8b176bb49638207_JaffaCakes118

  • Size

    100KB

  • Sample

    241207-2b1bmssmfm

  • MD5

    d3e73ddaa1693378b8b176bb49638207

  • SHA1

    762e7dad8ad0e51e7bf49f84f030dd6b2141531a

  • SHA256

    e1f23003d56780f888fc5a63db3d7147505ffb684be42becc58d5968a722838d

  • SHA512

    117adb2d15ab99c7432446cd8d090cbada432ffd633b401bca2bc4dac9717bf510c4b520708dd0e022a4863124c35bc3029be79a9c2059d89de4f0bbc6783c08

  • SSDEEP

    1536:dHL2dmGG3jq2/41RahuqfPH0rErZHs5dhsN:dqEZ3jq2QfahpfWqHaS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d3e73ddaa1693378b8b176bb49638207_JaffaCakes118

    • Size

      100KB

    • MD5

      d3e73ddaa1693378b8b176bb49638207

    • SHA1

      762e7dad8ad0e51e7bf49f84f030dd6b2141531a

    • SHA256

      e1f23003d56780f888fc5a63db3d7147505ffb684be42becc58d5968a722838d

    • SHA512

      117adb2d15ab99c7432446cd8d090cbada432ffd633b401bca2bc4dac9717bf510c4b520708dd0e022a4863124c35bc3029be79a9c2059d89de4f0bbc6783c08

    • SSDEEP

      1536:dHL2dmGG3jq2/41RahuqfPH0rErZHs5dhsN:dqEZ3jq2QfahpfWqHaS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks