General

  • Target

    db0250d64d512248596fc32fb5f29abd_JaffaCakes118

  • Size

    100KB

  • Sample

    241209-xc174sskcj

  • MD5

    db0250d64d512248596fc32fb5f29abd

  • SHA1

    aae29714c8c63cecef86416972ec915917659e63

  • SHA256

    faca904bcb1d3e811a19e099f4c3e34717084008fa97c89f816fcc0a17a0312f

  • SHA512

    9cf5d18cf3ba6cf78e6b8a0ac8f75415c89c919e0299336930321b22e2a0c56f4a31c5165a71279b7fe65cddffd8fafd1781553e2994948f0209332c8251bf00

  • SSDEEP

    3072:a8e+J9y0+d1bzB2MK1y1Nn6p5QL2Z7QUU:a8bJ9y0+d1bzB2MK1mHLme

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      db0250d64d512248596fc32fb5f29abd_JaffaCakes118

    • Size

      100KB

    • MD5

      db0250d64d512248596fc32fb5f29abd

    • SHA1

      aae29714c8c63cecef86416972ec915917659e63

    • SHA256

      faca904bcb1d3e811a19e099f4c3e34717084008fa97c89f816fcc0a17a0312f

    • SHA512

      9cf5d18cf3ba6cf78e6b8a0ac8f75415c89c919e0299336930321b22e2a0c56f4a31c5165a71279b7fe65cddffd8fafd1781553e2994948f0209332c8251bf00

    • SSDEEP

      3072:a8e+J9y0+d1bzB2MK1y1Nn6p5QL2Z7QUU:a8bJ9y0+d1bzB2MK1mHLme

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks