General

  • Target

    d690ef5a15a19bafd22e22757f028bea_JaffaCakes118

  • Size

    313KB

  • Sample

    241208-mf4gjavrgk

  • MD5

    d690ef5a15a19bafd22e22757f028bea

  • SHA1

    2abcf6b2d1dee419b8eae5f6f42ef8b8718ffc87

  • SHA256

    7003e5d941c1ba4dd659f16ff1a417dd2e98f4b005599abdc67bcca8234a2d74

  • SHA512

    dc41c4fdbb2147dfe0ce26efc5c553cafd7e0c3c69ce5cdc5d661fb63afe3cb52034b17b23bafdf1cad6bf4727f46b8b9713a39be9c780b4395a8da35bc98b9a

  • SSDEEP

    6144:77UYntUlCVmbYiZEX2k+AxJj998C3r6Xpkrax/ELKTI0I3GIFvI:3cEV8Z4J+3C3OjtELKT0FvI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d690ef5a15a19bafd22e22757f028bea_JaffaCakes118

    • Size

      313KB

    • MD5

      d690ef5a15a19bafd22e22757f028bea

    • SHA1

      2abcf6b2d1dee419b8eae5f6f42ef8b8718ffc87

    • SHA256

      7003e5d941c1ba4dd659f16ff1a417dd2e98f4b005599abdc67bcca8234a2d74

    • SHA512

      dc41c4fdbb2147dfe0ce26efc5c553cafd7e0c3c69ce5cdc5d661fb63afe3cb52034b17b23bafdf1cad6bf4727f46b8b9713a39be9c780b4395a8da35bc98b9a

    • SSDEEP

      6144:77UYntUlCVmbYiZEX2k+AxJj998C3r6Xpkrax/ELKTI0I3GIFvI:3cEV8Z4J+3C3OjtELKT0FvI

    • Modifies WinLogon for persistence

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks