General

  • Target

    dba6a61dd497b4d4f67f4dbcb2233f67_JaffaCakes118

  • Size

    100KB

  • Sample

    241209-1fqgkaskez

  • MD5

    dba6a61dd497b4d4f67f4dbcb2233f67

  • SHA1

    9158cb8975027cd9badd646f70f154f633b097d0

  • SHA256

    3c94ade0641b50b01a1afb3938e3b32d8039fd88153586d60f015c6431ab980e

  • SHA512

    623a3c3cff00bc18cfd90511d9b1354511ee9e0bce23fe113812abe6a11ec01f9a20708688268827740d534cc5dea3675311b3b052f9df5cfb0d5bdd4aa51b6d

  • SSDEEP

    1536:0JweEtxfWU73iIy70BtUFx+rUrDY5B1L7aT69RPFCVSn+uGaGSJcxgO3B08:wEtPy7qUFx+rUrDG9tCVSn+oGSS3u

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      dba6a61dd497b4d4f67f4dbcb2233f67_JaffaCakes118

    • Size

      100KB

    • MD5

      dba6a61dd497b4d4f67f4dbcb2233f67

    • SHA1

      9158cb8975027cd9badd646f70f154f633b097d0

    • SHA256

      3c94ade0641b50b01a1afb3938e3b32d8039fd88153586d60f015c6431ab980e

    • SHA512

      623a3c3cff00bc18cfd90511d9b1354511ee9e0bce23fe113812abe6a11ec01f9a20708688268827740d534cc5dea3675311b3b052f9df5cfb0d5bdd4aa51b6d

    • SSDEEP

      1536:0JweEtxfWU73iIy70BtUFx+rUrDY5B1L7aT69RPFCVSn+uGaGSJcxgO3B08:wEtPy7qUFx+rUrDG9tCVSn+oGSS3u

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks