General

  • Target

    d36ed88abe380278cd12c2ccc2a6f25f_JaffaCakes118

  • Size

    192KB

  • Sample

    241207-y222dawrhr

  • MD5

    d36ed88abe380278cd12c2ccc2a6f25f

  • SHA1

    49065e3f54be96b4ce4a25dcada33c22300b16ef

  • SHA256

    39af6234948f20547216f1809c248e6830310bbf0f7191b4e6993d23d3d316a1

  • SHA512

    91a1192af2b41497aaf4b16f801ff30e5faacc71f96ba65085755f6749f70239d422013d7493447b9f7d2e6e6a14d9c019c06d66cbbb1f480ca0bf5d09557374

  • SSDEEP

    3072:oacmXJfdXVC7vs2nc4jiktNasb0hl2rAag4IPfp:obedld2c4jCA0f0Mfp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d36ed88abe380278cd12c2ccc2a6f25f_JaffaCakes118

    • Size

      192KB

    • MD5

      d36ed88abe380278cd12c2ccc2a6f25f

    • SHA1

      49065e3f54be96b4ce4a25dcada33c22300b16ef

    • SHA256

      39af6234948f20547216f1809c248e6830310bbf0f7191b4e6993d23d3d316a1

    • SHA512

      91a1192af2b41497aaf4b16f801ff30e5faacc71f96ba65085755f6749f70239d422013d7493447b9f7d2e6e6a14d9c019c06d66cbbb1f480ca0bf5d09557374

    • SSDEEP

      3072:oacmXJfdXVC7vs2nc4jiktNasb0hl2rAag4IPfp:obedld2c4jCA0f0Mfp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks