General

  • Target

    d60139db2a6d23c965fbc6f844d58d44_JaffaCakes118

  • Size

    71KB

  • Sample

    241208-jq18dasmhk

  • MD5

    d60139db2a6d23c965fbc6f844d58d44

  • SHA1

    af5ddffc0f6f3433332ceac8ada9ab7906e65729

  • SHA256

    ab50c7a6412399a127f6df559d85bdb7de4e5969611d83b4110d766953082ff0

  • SHA512

    89f16264493c78659b25b74d3e93b421985ca809f62eeedb1d6c25f997212341997ea2edbf886667a9b263b189252aa11c5f40daab472e7ebda850feb0b255b0

  • SSDEEP

    1536:hRBqjWBXxJzH18U1q+xAe90GoAlQuCHOagmuI/Fw:hTq6BjzH18NDW0GoAlQbHOjmuui

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d60139db2a6d23c965fbc6f844d58d44_JaffaCakes118

    • Size

      71KB

    • MD5

      d60139db2a6d23c965fbc6f844d58d44

    • SHA1

      af5ddffc0f6f3433332ceac8ada9ab7906e65729

    • SHA256

      ab50c7a6412399a127f6df559d85bdb7de4e5969611d83b4110d766953082ff0

    • SHA512

      89f16264493c78659b25b74d3e93b421985ca809f62eeedb1d6c25f997212341997ea2edbf886667a9b263b189252aa11c5f40daab472e7ebda850feb0b255b0

    • SSDEEP

      1536:hRBqjWBXxJzH18U1q+xAe90GoAlQuCHOagmuI/Fw:hTq6BjzH18NDW0GoAlQbHOjmuui

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks