General

  • Target

    d6ab377d4ca4ce354cc8e2e24b294264_JaffaCakes118

  • Size

    100KB

  • Sample

    241208-mxngms1ndw

  • MD5

    d6ab377d4ca4ce354cc8e2e24b294264

  • SHA1

    0583d4549ebe2d668c8373e190307ad0f9c8f162

  • SHA256

    e9df88f6cec6217a8e78990a01e9964d599f44f351b11118d41c065ea3b3cfe7

  • SHA512

    fe5a290a6d094c3e22fe9a2cc970f70f7503cb56c1485755b5a97817ddcae7c569707d914923257c1f83e42cd6e64332972af47964324ca80675c4954040e633

  • SSDEEP

    1536:mCLNdzPoMBF9uNy43NrpNnn+mpjyTug63bCxvO2g9IGrjt4L2+mhGnDC+:muPo497435n+94bCxG2g9IymJmEnW+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d6ab377d4ca4ce354cc8e2e24b294264_JaffaCakes118

    • Size

      100KB

    • MD5

      d6ab377d4ca4ce354cc8e2e24b294264

    • SHA1

      0583d4549ebe2d668c8373e190307ad0f9c8f162

    • SHA256

      e9df88f6cec6217a8e78990a01e9964d599f44f351b11118d41c065ea3b3cfe7

    • SHA512

      fe5a290a6d094c3e22fe9a2cc970f70f7503cb56c1485755b5a97817ddcae7c569707d914923257c1f83e42cd6e64332972af47964324ca80675c4954040e633

    • SSDEEP

      1536:mCLNdzPoMBF9uNy43NrpNnn+mpjyTug63bCxvO2g9IGrjt4L2+mhGnDC+:muPo497435n+94bCxG2g9IymJmEnW+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks