General

  • Target

    d6f85ccdca7480dd5b1f37ce6a6eaeee_JaffaCakes118

  • Size

    100KB

  • Sample

    241208-pbghbaxqdp

  • MD5

    d6f85ccdca7480dd5b1f37ce6a6eaeee

  • SHA1

    56b85673fb70fe66795145f68bcd3fa249b096d2

  • SHA256

    cc8717da08e02ac3b82e23a4a26c463cd0ed8ca46a622127b99e5c7db77a14a5

  • SHA512

    08669d56dcd5128496c0325075612fd023e3a43f7a889c6eeb7214deee40fe9983ee93b5bce6e19fff3210e2f77cb344b377b4f6cdc7487b65ef598b7f93c06b

  • SSDEEP

    1536:6ZLacXFBA1d3GLgjyw+lZ9dVi2dBPACpoLEyN92hp1W3dTHsbNoJ5xz:6owW1dZj0lZvViOxyAyN9+mVbxz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d6f85ccdca7480dd5b1f37ce6a6eaeee_JaffaCakes118

    • Size

      100KB

    • MD5

      d6f85ccdca7480dd5b1f37ce6a6eaeee

    • SHA1

      56b85673fb70fe66795145f68bcd3fa249b096d2

    • SHA256

      cc8717da08e02ac3b82e23a4a26c463cd0ed8ca46a622127b99e5c7db77a14a5

    • SHA512

      08669d56dcd5128496c0325075612fd023e3a43f7a889c6eeb7214deee40fe9983ee93b5bce6e19fff3210e2f77cb344b377b4f6cdc7487b65ef598b7f93c06b

    • SSDEEP

      1536:6ZLacXFBA1d3GLgjyw+lZ9dVi2dBPACpoLEyN92hp1W3dTHsbNoJ5xz:6owW1dZj0lZvViOxyAyN9+mVbxz

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks