General

  • Target

    d98a75d28761614c25ae20efe80e4d17_JaffaCakes118

  • Size

    292KB

  • Sample

    241209-n953ws1pbq

  • MD5

    d98a75d28761614c25ae20efe80e4d17

  • SHA1

    ef1630838216eaa80a940275cbdb25a9210da6e1

  • SHA256

    50b7ac01018a604bbc0fe90b7514716c1093f3f9766fc044905c318a2a3e3f77

  • SHA512

    3f2d5e6f25da6af05ee2d600a66031235d4bedae39fb0a56b1d4c7b53fc7525388832171d5661d953d0d768e7f2100dc24c30f19d6b6151e20d5d26afd20a2a5

  • SSDEEP

    6144:XIaYX6rO+MpmqaCOK15DetQv9ha1m2g6SJmIWte:XIbKrHMpm85KtQvim2kEICe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d98a75d28761614c25ae20efe80e4d17_JaffaCakes118

    • Size

      292KB

    • MD5

      d98a75d28761614c25ae20efe80e4d17

    • SHA1

      ef1630838216eaa80a940275cbdb25a9210da6e1

    • SHA256

      50b7ac01018a604bbc0fe90b7514716c1093f3f9766fc044905c318a2a3e3f77

    • SHA512

      3f2d5e6f25da6af05ee2d600a66031235d4bedae39fb0a56b1d4c7b53fc7525388832171d5661d953d0d768e7f2100dc24c30f19d6b6151e20d5d26afd20a2a5

    • SSDEEP

      6144:XIaYX6rO+MpmqaCOK15DetQv9ha1m2g6SJmIWte:XIbKrHMpm85KtQvim2kEICe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks