General

  • Target

    d490bad709a7d91e203aaa1f22b634ba_JaffaCakes118

  • Size

    120KB

  • Sample

    241208-bq4dqszncj

  • MD5

    d490bad709a7d91e203aaa1f22b634ba

  • SHA1

    4dc62b954e2d323ca36c2a870c8030ee0705d47c

  • SHA256

    c6dafefda47e65567f1e1845955f2282b0c3a943f45c62bb3abc63459a8a1fb4

  • SHA512

    9453ec5db32d2a6674a5f5a93748453f0e45f7986a89fe210a4683ba53230592803d821f33c35f1abf54c2e8ac13e2ac12379509e1e405eac302592dc90e4233

  • SSDEEP

    1536:vEPG3K6QDzgJqiGqrEkf+rvmGd1YO3vK0kYrz+fKvt/vp4vlWiJvAECr7ksuZDo1:vEPG3GDIquEm+KAbiyz+SBEoQAECr7p

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d490bad709a7d91e203aaa1f22b634ba_JaffaCakes118

    • Size

      120KB

    • MD5

      d490bad709a7d91e203aaa1f22b634ba

    • SHA1

      4dc62b954e2d323ca36c2a870c8030ee0705d47c

    • SHA256

      c6dafefda47e65567f1e1845955f2282b0c3a943f45c62bb3abc63459a8a1fb4

    • SHA512

      9453ec5db32d2a6674a5f5a93748453f0e45f7986a89fe210a4683ba53230592803d821f33c35f1abf54c2e8ac13e2ac12379509e1e405eac302592dc90e4233

    • SSDEEP

      1536:vEPG3K6QDzgJqiGqrEkf+rvmGd1YO3vK0kYrz+fKvt/vp4vlWiJvAECr7ksuZDo1:vEPG3GDIquEm+KAbiyz+SBEoQAECr7p

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks