General

  • Target

    d264471184158ae9afa4f205b2c2dbf2_JaffaCakes118

  • Size

    100KB

  • Sample

    241207-pewreaxlhp

  • MD5

    d264471184158ae9afa4f205b2c2dbf2

  • SHA1

    3e4a52cbcfa2249ab4fb7dee17ce08afdd126930

  • SHA256

    946daac1ebaf7895a3ed6947ec6654cbbaefcdcaf46b160afbdaefea15e5d52e

  • SHA512

    e17045fcf24a8850dd13997398a8940df6ec3807c94fb1d37ad78fe1d46967b1434fb3c1e57ca9d2b94abe71d47e126ed4c8fc87d250661bdb6eea84a7b03558

  • SSDEEP

    1536:5Nb+m6r9dr2SnxV1dUuKk1+MUf62hR8hL8qIg9PweW3z2NLIuAzwPZ42U/:Xbqr9dX1dUC+MUy2PEN9PweykLliwLI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d264471184158ae9afa4f205b2c2dbf2_JaffaCakes118

    • Size

      100KB

    • MD5

      d264471184158ae9afa4f205b2c2dbf2

    • SHA1

      3e4a52cbcfa2249ab4fb7dee17ce08afdd126930

    • SHA256

      946daac1ebaf7895a3ed6947ec6654cbbaefcdcaf46b160afbdaefea15e5d52e

    • SHA512

      e17045fcf24a8850dd13997398a8940df6ec3807c94fb1d37ad78fe1d46967b1434fb3c1e57ca9d2b94abe71d47e126ed4c8fc87d250661bdb6eea84a7b03558

    • SSDEEP

      1536:5Nb+m6r9dr2SnxV1dUuKk1+MUf62hR8hL8qIg9PweW3z2NLIuAzwPZ42U/:Xbqr9dX1dUC+MUy2PEN9PweykLliwLI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks