General

  • Target

    db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118

  • Size

    326KB

  • Sample

    241209-xr1vwsspak

  • MD5

    db17cba3c696f7cd8c3b9bb16bbc303f

  • SHA1

    da3dd87afb7ea399cd54a36f91658a4f6d390615

  • SHA256

    19cd856e41e9b6986e9d416970b424b5eb953c92ed814d7973699e7d9591c2b9

  • SHA512

    ae13871042400b4966c5f9d56e867622ab3434e244d1ef15c42146030cc4f0ec3049a37a0ef0adf63327f896ca8fd7fef0bb8825f5ed7e04fe52d0cf049bfde5

  • SSDEEP

    6144:luMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EFjBfvS17CLbd5L4yS:l+YcUc6SBLLTSEgBAnhc1kG/hvIC/7L4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118

    • Size

      326KB

    • MD5

      db17cba3c696f7cd8c3b9bb16bbc303f

    • SHA1

      da3dd87afb7ea399cd54a36f91658a4f6d390615

    • SHA256

      19cd856e41e9b6986e9d416970b424b5eb953c92ed814d7973699e7d9591c2b9

    • SHA512

      ae13871042400b4966c5f9d56e867622ab3434e244d1ef15c42146030cc4f0ec3049a37a0ef0adf63327f896ca8fd7fef0bb8825f5ed7e04fe52d0cf049bfde5

    • SSDEEP

      6144:luMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EFjBfvS17CLbd5L4yS:l+YcUc6SBLLTSEgBAnhc1kG/hvIC/7L4

    • Modifies WinLogon for persistence

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks