General

  • Target

    d1e8bb3aeea615b55a273c56de13a657_JaffaCakes118

  • Size

    120KB

  • Sample

    241207-l8cc3sxqbx

  • MD5

    d1e8bb3aeea615b55a273c56de13a657

  • SHA1

    f0ca8b3e24ab0e523271bd398ebf842bfde05e3b

  • SHA256

    e7544e995e7c96878ec0941e240f33a1be94dcde6905ad5d7af9a777c9dd3a84

  • SHA512

    37f4345e944476f224dacde973f046bbf75afde6e9924cafa4a82bda9ce68198c1fe4e2e9cbf2bb01e497d246d5521cd17acae996f6102cce2ab792896630587

  • SSDEEP

    3072:xWNvFAjFZ+caA5WeEdwkFKjXD4W/bg6lWlBOWCQAOxox:xcvFAjb+caA5We94mcSMXCJNx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d1e8bb3aeea615b55a273c56de13a657_JaffaCakes118

    • Size

      120KB

    • MD5

      d1e8bb3aeea615b55a273c56de13a657

    • SHA1

      f0ca8b3e24ab0e523271bd398ebf842bfde05e3b

    • SHA256

      e7544e995e7c96878ec0941e240f33a1be94dcde6905ad5d7af9a777c9dd3a84

    • SHA512

      37f4345e944476f224dacde973f046bbf75afde6e9924cafa4a82bda9ce68198c1fe4e2e9cbf2bb01e497d246d5521cd17acae996f6102cce2ab792896630587

    • SSDEEP

      3072:xWNvFAjFZ+caA5WeEdwkFKjXD4W/bg6lWlBOWCQAOxox:xcvFAjb+caA5We94mcSMXCJNx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks